This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016.
The 9 full papers presented together with two invited papers were carefully reviewed and selected from a total of 91 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; privacy in social media.
This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, ...
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held in Porto, Portugal, in February 2017. The 13 full papers presented were carefully reviewed and selected from a total of 100 submissions.
This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2017, held...
This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions.They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.
This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA...