Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II /
Computer Security -- ESORICS 2015 : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II /
edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl.
- 1 online resource
- Security and Cryptology ; 9327 .
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.
9783319241777
10.1007/978-3-319-24177-7 doi
Computer security.
Data encryption (Computer science).
Information Systems.
Computer software.
Computer science.
Systems and Data Security.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
QA76.9.A25
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.
9783319241777
10.1007/978-3-319-24177-7 doi
Computer security.
Data encryption (Computer science).
Information Systems.
Computer software.
Computer science.
Systems and Data Security.
Cryptology.
Management of Computing and Information Systems.
Algorithm Analysis and Problem Complexity.
Computers and Society.
QA76.9.A25