Advertisement

Information Security Theory and Practice

12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers

  • Olivier Blazy
  • Chan Yeob Yeun
Conference proceedings WISTP 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11469)

Also part of the Security and Cryptology book sub series (LNSC, volume 11469)

Table of contents

  1. Front Matter
    Pages i-xii
  2. Invited Papers

  3. Real World

    1. Front Matter
      Pages 13-13
    2. Adam Janovsky, Jan Krhovjak, Vashek Matyas
      Pages 15-27
    3. Mohamed Sami Rakha, Fahim T. Imam, Thomas R. Dean
      Pages 44-60
  4. Cryptography

    1. Front Matter
      Pages 61-61
    2. Sookyung Eom, Hyang-Sook Lee, Seongan Lim
      Pages 63-77
    3. Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto
      Pages 91-106
  5. Artificial Learning

    1. Front Matter
      Pages 107-107
    2. Khaled Karray, Jean-Luc Danger, Sylvain Guilley, Moulay Abdelaziz Elaabid
      Pages 109-128
    3. Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis
      Pages 129-144
  6. Cybersecurity

    1. Front Matter
      Pages 145-145
    2. Thulani Mashiane, Elmarie Kritzinger
      Pages 147-156
    3. Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis
      Pages 157-173
    4. Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Muttukrishnan Rajarajan
      Pages 174-189
  7. Internet of Things

    1. Front Matter
      Pages 191-191
    2. Sankalp Ghatpande, Johann Großschädl, Zhe Liu
      Pages 193-206
  8. Back Matter
    Pages 223-223

About these proceedings

Introduction

This volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018.

The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things.

Keywords

access control artificial intelligence authentication automotive security classification computer networks cryptography data privacy data security embedded systems security hardware Human-Computer Interaction (HCI) intrusion detection mobile computing network security privacy security security systems

Editors and affiliations

  1. 1.Université de LimogesLimogesFrance
  2. 2.Khalifa UniversityAbu DhabiUnited Arab Emirates

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-20074-9
  • Copyright Information IFIP International Federation for Information Processing 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-20073-2
  • Online ISBN 978-3-030-20074-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering