Information Security Practice and Experience 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings / [electronic resource] :
edited by Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri.
- 1st ed. 2022.
- XIV, 642 p. 159 illus., 114 illus. in color. online resource.
- Lecture Notes in Computer Science, 13620 1611-3349 ; .
- Lecture Notes in Computer Science, 13620 .
Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
9783031212802
10.1007/978-3-031-21280-2 doi
Data protection.
Computer networks .
Computer systems.
Application software.
Computers.
Security Services.
Computer Communication Networks.
Computer System Implementation.
Computer and Information Systems Applications.
Computing Milieux.
Data and Information Security.
QA76.9.A25
005.8
Blockchain -- Security for Critical Infrastructure -- IoT Security -- Software Security -- Network -- Web Security -- Authentication -- Biometric Security -- Cryptography.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
9783031212802
10.1007/978-3-031-21280-2 doi
Data protection.
Computer networks .
Computer systems.
Application software.
Computers.
Security Services.
Computer Communication Networks.
Computer System Implementation.
Computer and Information Systems Applications.
Computing Milieux.
Data and Information Security.
QA76.9.A25
005.8