Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8880)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ICISS 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- JPEG compression
- Web security
- authentication
- biometrics
- bitcoins
- browser vulnerabilities
- cyber attacks
- data mining
- electronic cash system
- encryption
- extension-based attacks
- formal model
- image authentication
- machine learning
- malware detection system
- network security
- obfuscation
- outsourcing
- trust
- usable security
Table of contents (27 papers)
-
Contributed Papers
-
Security Policies
-
Security User Interfaces
-
Malware Detection
Other volumes
-
Information Systems Security
Editors and Affiliations
Bibliographic Information
Book Title: Information Systems Security
Book Subtitle: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
Editors: Atul Prakash, Rudrapatna Shyamasundar
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-13841-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-13840-4Published: 20 November 2014
eBook ISBN: 978-3-319-13841-1Published: 03 December 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXIV, 478
Number of Illustrations: 163 b/w illustrations
Topics: Systems and Data Security, Cryptology, Computer Communication Networks