Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings /

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Jajoda, Sushil. (Editor, http://id.loc.gov/vocabulary/relators/edt), Mazumdar, Chandan. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2015.
Edition:1st ed. 2015.
Series:Security and Cryptology ; 9478
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-26961-0
Summary:This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.
Physical Description:XVI, 584 p. 156 illus. in color. online resource.
ISBN:9783319269610