𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Information Security Volume 6531 || Double Spending Protection for E-Cash Based on Risk Management

✍ Scribed by Burmester, Mike; Tsudik, Gene; Magliveras, Spyros; Ilić, Ivana


Book ID
118222454
Publisher
Springer Berlin Heidelberg
Year
2011
Tongue
English
Weight
229 KB
Edition
1
Category
Article
ISBN
3642181783

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010. The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory.


📜 SIMILAR VOLUMES


[Lecture Notes in Computer Science] Info
✍ Burmester, Mike; Tsudik, Gene; Magliveras, Spyros; Ilić, Ivana 📂 Article 📅 2011 🏛 Springer Berlin Heidelberg 🌐 English ⚖ 229 KB

This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010. The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are

[Lecture Notes in Computer Science] Comp
✍ Herrero, Álvaro; Corchado, Emilio 📂 Article 📅 2011 🏛 Springer Berlin Heidelberg 🌐 English ⚖ 137 KB

This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural

[Lecture Notes in Computer Science] Info
✍ Dawson, E. P.; Clark, A.; Boyd, Colin 📂 Article 📅 2000 🏛 Springer Berlin Heidelberg ⚖ 183 KB

This book constitutes the refereed proceedings of the 5th Australasian Conference on Information Security and Privacy, ACISP 2000, held in Brisbane, QLD, Australia, in July 2000.The 37 revised full papers presented together with two invited contributions were carefully reviewed and selected from a t