|
|
|
|
LEADER |
03557nam a2200601 4500 |
001 |
978-3-030-05171-6 |
003 |
DE-He213 |
005 |
20191027133311.0 |
007 |
cr nn 008mamaa |
008 |
181205s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030051716
|9 978-3-030-05171-6
|
024 |
7 |
|
|a 10.1007/978-3-030-05171-6
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Systems Security
|h [electronic resource] :
|b 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /
|c edited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XIX, 481 p. 134 illus., 83 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11281
|
505 |
0 |
|
|a Security for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Optical data processing.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
1 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Image Processing and Computer Vision.
|0 http://scigraph.springernature.com/things/product-market-codes/I22021
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a System Performance and Evaluation.
|0 http://scigraph.springernature.com/things/product-market-codes/I13049
|
700 |
1 |
|
|a Ganapathy, Vinod.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jaeger, Trent.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Shyamasundar, R.K.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030051709
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030051723
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11281
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-05171-6
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|