|
|
|
|
LEADER |
03469nam a2200589 4500 |
001 |
978-3-030-30215-3 |
003 |
DE-He213 |
005 |
20191025052919.0 |
007 |
cr nn 008mamaa |
008 |
190826s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030302153
|9 978-3-030-30215-3
|
024 |
7 |
|
|a 10.1007/978-3-030-30215-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security
|h [electronic resource] :
|b 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings /
|c edited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XI, 488 p. 247 illus., 99 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11723
|
505 |
0 |
|
|a Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware Analysis -- Crypto III: Signatures and Authentication.
|
520 |
|
|
|a This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28050
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 http://scigraph.springernature.com/things/product-market-codes/I18008
|
700 |
1 |
|
|a Lin, Zhiqiang.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Papamanthou, Charalampos.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Polychronakis, Michalis.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030302146
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030302160
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11723
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-30215-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|