<p>This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017.<p> The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissio
Wireless Sensor Network Security (Cryptology and Information Security) (Cryptology and Information Security)
โ Scribed by Javier Lopez, Jianying Zhou
- Tongue
- English
- Leaves
- 321
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition i
This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of
This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of
<P>This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009.</P> <P>The 41 revised full papers presented were carefully reviewed and selected from