Information Security and Cryptology - ICISC 2014

Information Security and Cryptology - ICISC 2014

4.11 - 1251 ratings - Source

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.For example, fake Pokemon Yellow application used Nintendoa#39;s popular Game Boy RPG as its application screenshots. ... such as Infinity Blade II2 and Temple Run3, appeared on Google Play, even before their official releases in Android version. ... Another way is to use desktop browsers, download applications from the providersa#39; websites and later synchronize the applications to their mobile devices.

Title:Information Security and Cryptology - ICISC 2014
Author:Jooyoung Lee, Jongsung Kim
Publisher:Springer - 2015-03-16


You Must CONTINUE and create a free account to access unlimited downloads & streaming