
Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8565)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICISC 2013.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
Table of contents (31 papers)
-
Proxy Re-encryption
-
Side Channel Analysis and Its Countermeasures
Other volumes
-
Information Security and Cryptology -- ICISC 2013
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology -- ICISC 2013
Book Subtitle: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
Editors: Hyang-Sook Lee, Dong-Guk Han
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-12160-4
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-12159-8Published: 31 October 2014
eBook ISBN: 978-3-319-12160-4Published: 18 October 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 538
Number of Illustrations: 94 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems