Information Security and Cryptology -- ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 1...

Full description

Bibliographic Details
Other Authors: Kwon, Taekyoung (Editor), Lee, Mun-Kyu (Editor), Kwon, Daesung (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2013, 2013
Edition:1st ed. 2013
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02322nmm a2200361 u 4500
001 EB000391349
003 EBX01000000000000000244402
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783642376825 
100 1 |a Kwon, Taekyoung  |e [editor] 
245 0 0 |a Information Security and Cryptology -- ICISC 2012  |h Elektronische Ressource  |b 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers  |c edited by Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon 
250 |a 1st ed. 2013 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2013, 2013 
300 |a XIV, 512 p. 108 illus  |b online resource 
505 0 |a Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol -- Identity-based encryption -- Efficient implementation -- Cloud computing security -- Side channel analysis -- Digital signature -- Privacy enhancement 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a IT Operations 
700 1 |a Lee, Mun-Kyu  |e [editor] 
700 1 |a Kwon, Daesung  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-642-37682-5 
856 4 0 |u https://doi.org/10.1007/978-3-642-37682-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement