Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 12...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Lee, Hyang-Sook (Editor), Han, Dong-Guk (Editor)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2014.
Series:Lecture Notes in Computer Science, 8565
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Secure multiparty computation
  • Proxy re-encryption
  • Side channel analysis and its countermeasures
  • Cryptanalysis
  • Embedded system security and its implementation
  • Primitives for cryptography
  • Digital signature
  • Security protocol
  • Cyber security.- Public key cryptography.