Overview
- Up-to-date results
- Fast track conference proceedings
- State-of-the-art report
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8958)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICICS 2014.
Buy print copy
About this book
Similar content being viewed by others
Keywords
- Access control
- Applied cryptography
- Authentication
- Cryptography
- Digital signature
- Dual encryption system
- E-coin
- Elliptic curve cryptography
- Information security
- Network security
- Oblivious transfer
- One-time password
- Privacy protection
- Provably secure
- Secure applications
- Secure protocols
- Secure systems
- Security
- Security proofs
- Side-channel analysis
Table of contents (22 papers)
Other volumes
-
Information and Communications Security
Editors and Affiliations
Bibliographic Information
Book Title: Information and Communications Security
Book Subtitle: 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
Editors: Lucas C. K. Hui, S. H. Qing, Elaine Shi, S. M. Yiu
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-21966-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-21965-3Published: 11 August 2015
eBook ISBN: 978-3-319-21966-0Published: 01 August 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 321
Number of Illustrations: 52 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Computer Communication Networks, Management of Computing and Information Systems, Computers and Society