This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Subscribe to:
Post Comments (Atom)
The Colt 1911 Pistol (Osprey Weapon 9)
Download The Colt 1911 Pistol (Osprey Weapon 9) First used in combat during the Punitive Expedition into Me...
-
Download Drawdown: The Most Comprehensive Plan Ever Proposed To Reverse Global Warming The 100 most substan...
-
Download Invision Power Board 2: A User Guide. This book is your guide to configuring, managing and maintai...
-
Download The Grant Cardone Rebuttal Manual 200+ Page Rebuttal Manual. Learn to handle any objection with th...
No comments:
Post a Comment