Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 14341)
Included in the following conference series:
Conference proceedings info: ISPEC 2023.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (35 papers)
Other volumes
-
Information Security Practice and Experience
Keywords
- artificial intelligence
- authentication
- computer crime
- computer hardware
- computer networks
- access control
- embedded system security
- secure data sharing in cloud
- applied cryptography
- formal methods for security
- security and privacy in edge computing
- big data security and privacy
- intrusion detection
- security and privacy in IoT
- biometric security
- key management
- security and privacy in ubiquitous computing
- computer crime
About this book
The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
Editors and Affiliations
Bibliographic Information
Book Title: Information Security Practice and Experience
Book Subtitle: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings
Editors: Weizhi Meng, Zheng Yan, Vincenzo Piuri
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-981-99-7032-2
Publisher: Springer Singapore
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023
Softcover ISBN: 978-981-99-7031-5Published: 09 November 2023
eBook ISBN: 978-981-99-7032-2Published: 07 November 2023
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 616
Number of Illustrations: 43 b/w illustrations, 114 illustrations in colour
Topics: Security Services, Computer Communication Networks, Computer System Implementation, Computer Applications, Computing Milieux, Systems and Data Security