Information Security Applications

Information Security Applications

17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers

Choi, Dooho; Guilley, Sylvain

Springer International Publishing AG

03/2017

398

Mole

Inglês

9783319565484

15 a 20 dias

6204

Descrição não disponível.
Network security.- Threat analysis.- Application security.- Cryptographic protocols.- Cryptanalysis.- Cryptographic implementations.- Authentication using bio and ML.- Authentication.- ICT Convergent security.
biometrics;cyber security;embedded system;security and privacy;Web security;artificial neural networ;authentication;cellular networks;cryptolotgy;data encryption;database and storage security;evolutionary computation;machine learning;network security;public key cryptography;soft computing;software and application security;systems and data security;systems security