|
|
|
|
LEADER |
03176nam a2200565 4500 |
001 |
978-3-030-20074-9 |
003 |
DE-He213 |
005 |
20191025182231.0 |
007 |
cr nn 008mamaa |
008 |
190511s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030200749
|9 978-3-030-20074-9
|
024 |
7 |
|
|a 10.1007/978-3-030-20074-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security Theory and Practice
|h [electronic resource] :
|b 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers /
|c edited by Olivier Blazy, Chan Yeob Yeun.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XII, 223 p. 58 illus., 21 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11469
|
505 |
0 |
|
|a Real world -- Cryptography -- Artificial learning -- Cybersecurity -- Internet of things.
|
520 |
|
|
|a This volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018. The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28050
|
650 |
2 |
4 |
|a Security Services.
|0 http://scigraph.springernature.com/things/product-market-codes/I28030
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
700 |
1 |
|
|a Blazy, Olivier.
|e editor.
|0 (orcid)0000-0001-6205-8249
|1 https://orcid.org/0000-0001-6205-8249
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yeun, Chan Yeob.
|e editor.
|0 (orcid)0000-0002-1398-952X
|1 https://orcid.org/0000-0002-1398-952X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030200732
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030200756
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11469
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-20074-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|