000 | 04266nam a22007335i 4500 | ||
---|---|---|---|
001 | 978-3-030-01950-1 | ||
003 | DE-He213 | ||
005 | 20240730170412.0 | ||
007 | cr nn 008mamaa | ||
008 | 181026s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030019501 _9978-3-030-01950-1 |
||
024 | 7 |
_a10.1007/978-3-030-01950-1 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM021000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
245 | 1 | 0 |
_aInformation and Communications Security _h[electronic resource] : _b20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / _cedited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXV, 818 p. 200 illus., 109 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11149 |
|
505 | 0 | _aBlockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. | |
520 | _aThis book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management. | ||
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 1 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _993208 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aComputer Communication Networks. _993212 |
700 | 1 |
_aNaccache, David. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993214 |
|
700 | 1 |
_aXu, Shouhuai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993216 |
|
700 | 1 |
_aQing, Sihan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993218 |
|
700 | 1 |
_aSamarati, Pierangela. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993220 |
|
700 | 1 |
_aBlanc, Gregory. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993221 |
|
700 | 1 |
_aLu, Rongxing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993222 |
|
700 | 1 |
_aZhang, Zonghua. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993223 |
|
700 | 1 |
_aMeddahi, Ahmed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993225 |
|
710 | 2 |
_aSpringerLink (Online service) _993227 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030019495 |
776 | 0 | 8 |
_iPrinted edition: _z9783030019518 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11149 _993228 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-01950-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86897 _d86897 |