Information Systems Security [recurso electrónico] : 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings / edited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 10063Editor: Cham : Springer International Publishing : Imprint: Springer, 2016Descripción: XV, 544 p. 134 illus. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783319498065Tema(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Algorithms | Management information systems | Computer Science | Systems and Data Security | Security | Data Encryption | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Management of Computing and Information SystemsFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | 1 | No para préstamo |
Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.