|
Showing 1 - 2 of
2 matches in All Departments
This book constitutes the refereed proceedings of the 7th
International Conference on Information Systems Security, ICISS
2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers
and 4 invited papers were carefully reviewed and selected from 105
submissions. The papers are organized in topical sections on access
control and authorization, malwares and anomaly detection, crypto
and steganographic systems, verification and analysis, wireless and
mobile systems security, Web and network security.
This book constitutes the refereed proceedings of the 11th
International Conference on Information Systems Security, ICISS
2015, held in Kolkata, India, in December 2015. The 24 revised full
papers and 8 short papers presented together with 4 invited papers
were carefully reviewed and selected from 133 submissions. The
papers address the following topics: access control; attacks and
mitigation; cloud security; crypto systems and protocols;
information flow control; sensor networks and cognitive radio; and
watermarking and steganography.
|
You may like...
Higher
Michael Buble
CD
(1)
R482
Discovery Miles 4 820
|