Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28-30, 2019, Proceedings / [electronic resource] :
edited by Nuttapong Attrapadung, Takeshi Yagi.
- 1st ed. 2019.
- XIII, 412 p. 995 illus., 41 illus. in color. online resource.
- Security and Cryptology, 11689 2946-1863 ; .
- Security and Cryptology, 11689 .
Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols -- Symmetric-Key Primitives -- Malware Detection and Classification -- Intrusion Detection and Prevention -- Web and Usable Security -- Cryptanalysis on Symmetric-Key Primitives -- Forensics.
This book constitutes the refereed proceedings of the 14th International Workshop on Security, IWSEC 2019, held in Tokyo, Japan, in August 2019. The 18 regular papers and 5 short papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: Public-Key Primitives; Cryptanalysis on Public-Key Primitives; Cryptographic Protocols; Symmetric-Key Primitives; Malware Detection and Classification; Intrusion Detection and Prevention; Web and Usable Security; Cryptanalysis on Symmetric-Key Primitives; and Forensics.
9783030268343
10.1007/978-3-030-26834-3 doi
Data protection.
Computer networks .
Computers--Law and legislation.
Information technology--Law and legislation.
Computers and civilization.
Software engineering.
Data and Information Security.
Computer Communication Networks.
Legal Aspects of Computing.
Computers and Society.
Software Engineering.
QA76.9.A25
005.8
Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols -- Symmetric-Key Primitives -- Malware Detection and Classification -- Intrusion Detection and Prevention -- Web and Usable Security -- Cryptanalysis on Symmetric-Key Primitives -- Forensics.
This book constitutes the refereed proceedings of the 14th International Workshop on Security, IWSEC 2019, held in Tokyo, Japan, in August 2019. The 18 regular papers and 5 short papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: Public-Key Primitives; Cryptanalysis on Public-Key Primitives; Cryptographic Protocols; Symmetric-Key Primitives; Malware Detection and Classification; Intrusion Detection and Prevention; Web and Usable Security; Cryptanalysis on Symmetric-Key Primitives; and Forensics.
9783030268343
10.1007/978-3-030-26834-3 doi
Data protection.
Computer networks .
Computers--Law and legislation.
Information technology--Law and legislation.
Computers and civilization.
Software engineering.
Data and Information Security.
Computer Communication Networks.
Legal Aspects of Computing.
Computers and Society.
Software Engineering.
QA76.9.A25
005.8