Tag Archives: December 3-5

Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)


Author(s): Jongsung Kim, Jooyoung Lee

Publisher: Springer
Publish date: 2015-03-17
ISBN-10: 3319159429
ISBN-13: 9783319159423
Language: English
Description: This book constitutes the thoroughly refereed post-conference
proceedings of the 17th International Conference on Information
Security and Cryptology, ICISC 2014, held in Seoul, South Korea in
December 2014. The 27 revised full papers presented were carefully
selected from 91 submissions during two rounds of reviewing. The
papers provide the latest results in research, development and
applications in the field of information security and cryptology.
They are organized in topical sections on RSA security, digital
signature, public key cryptography, block ciphers, network
security, mobile security, hash functions, information hiding and
efficiency,… more…

Read Source: Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)»

Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)


Author(s): Jongsung Kim, Jooyoung Lee

Publisher: Springer
Publish date: 2015-03-17
ISBN-10: 3319159429
ISBN-13: 9783319159423
Language: English
Description: This book constitutes the thoroughly refereed post-conference
proceedings of the 17th International Conference on Information
Security and Cryptology, ICISC 2014, held in Seoul, South Korea in
December 2014. The 27 revised full papers presented were carefully
selected from 91 submissions during two rounds of reviewing. The
papers provide the latest results in research, development and
applications in the field of information security and cryptology.
They are organized in topical sections on RSA security, digital
signature, public key cryptography, block ciphers, network
security, mobile security, hash functions, information hiding and
efficiency,… more…

Read Source: Information Security and Cryptology – ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Lecture Notes in Computer Science) (by Jongsung Kim, Jooyoung Lee)»