Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 14411)
Included in the following conference series:
Conference proceedings info: ISC 2023.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (29 papers)
-
Machine Learning
-
Mobile Security and Trusted Execution
Other volumes
-
Information Security
Keywords
- artificial intelligence
- authentication
- computer networks
- computer systems
- cryptography
- data communication systems
- data mining
- data security
- databases
- distributed computer systems
- distributed systems
- encryption
- engineering
- network protocols
- network security
- parallel processing systems
- public key cryptography
- signal processing
- software design
- software engineering
About this book
The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
Editors and Affiliations
Bibliographic Information
Book Title: Information Security
Book Subtitle: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings
Editors: Elias Athanasopoulos, Bart Mennink
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-49187-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Softcover ISBN: 978-3-031-49186-3Published: 01 December 2023
eBook ISBN: 978-3-031-49187-0Published: 30 November 2023
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 598
Number of Illustrations: 51 b/w illustrations, 79 illustrations in colour
Topics: Systems and Data Security, Computer Systems Organization and Communication Networks, Cryptology, Mobile and Network Security