The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp
[Lecture Notes in Computer Science] Computer Network Security Volume 7531 || A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols
β Scribed by Kotenko, Igor; Skormin, Victor
- Book ID
- 120519666
- Publisher
- Springer Berlin Heidelberg
- Year
- 2012
- Tongue
- English
- Weight
- 217 KB
- Edition
- 1
- Category
- Article
- ISBN
- 364233704X
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.
π SIMILAR VOLUMES