Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12024)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: WISTP 2019.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019.
The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
Similar content being viewed by others
Keywords
- access control
- authentication
- computer hardware
- computer networks
- computer security
- computer systems
- cryptography
- data communication systems
- data security
- distributed computer systems
- embedded systems
- network protocols
- network security
- privacy
- security systems
- signal processing
- software design
- software engineering
Table of contents (15 papers)
-
Invited Paper
-
Authentication
-
Cryptography
Other volumes
-
Information Security Theory and Practice
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Theory and Practice
Book Subtitle: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings
Editors: Maryline Laurent, Thanassis Giannetsos
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-41702-4
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: IFIP International Federation for Information Processing 2020
Softcover ISBN: 978-3-030-41701-7Published: 23 February 2020
eBook ISBN: 978-3-030-41702-4Published: 02 March 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 253
Number of Illustrations: 62 b/w illustrations, 29 illustrations in colour
Topics: Systems and Data Security, Cryptology, Mobile and Network Security, Computer Communication Networks, Information Systems Applications (incl. Internet)