This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security
Welcome to the 2nd International Workshop on Security and Privacy in Systems and Communication Netwo...
This book contains the papers accepted for publication, after a peer-review process, to the Third In...
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data vo...
This book constitutes the refereed proceedings of the Second International Conference on Security in...
This book constitutes the thoroughly refereed postproceedings of the 4th International Conference on...
This open access book constitutes the thoroughly refereed proceedings of the First International ISC...
The purpose of this book is to present some of the critical security challenges in today's computing...
This book constitutes the refereed proceedings of the 4th International Conference on Principles of ...
This book constitutes the refereed post-conference proceedings of the First International Conference...
This book constitutes the refereed proceedings of the 12th International Workshop on Security and Tr...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Cryptography will continue to play important roles in developing of new security solutions which wil...
Welcome to the 2nd International Workshop on Security and Privacy in Systems and Communication Netwo...
This book contains the papers accepted for publication, after a peer-review process, to the Third In...
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data vo...
This book constitutes the refereed proceedings of the Second International Conference on Security in...
This book constitutes the thoroughly refereed postproceedings of the 4th International Conference on...
This open access book constitutes the thoroughly refereed proceedings of the First International ISC...
The purpose of this book is to present some of the critical security challenges in today's computing...
This book constitutes the refereed proceedings of the 4th International Conference on Principles of ...
This book constitutes the refereed post-conference proceedings of the First International Conference...
This book constitutes the refereed proceedings of the 12th International Workshop on Security and Tr...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Cryptography will continue to play important roles in developing of new security solutions which wil...
Welcome to the 2nd International Workshop on Security and Privacy in Systems and Communication Netwo...
This book contains the papers accepted for publication, after a peer-review process, to the Third In...
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data vo...