Narrow your search

Library

AP (1)

KDG (1)

KU Leuven (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

ULB (1)

ULiège (1)

VIVES (1)


Resource type

book (1)

digital (1)


Language

English (2)


Year
From To Submit

2015 (2)

Listing 1 - 2 of 2
Sort by

Book
Information Security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
Authors: ---
ISBN: 9783319233185 3319233173 9783319233178 3319233181 Year: 2015 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security. .


Digital
Information Security : 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings
Authors: ---
ISBN: 9783319233185 9783319233178 9783319233192 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security. .

Listing 1 - 2 of 2
Sort by