|
|
|
|
LEADER |
03078nam a22005775i 4500 |
001 |
978-3-319-72359-4 |
003 |
DE-He213 |
005 |
20171208015853.0 |
007 |
cr nn 008mamaa |
008 |
171208s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319723594
|9 978-3-319-72359-4
|
024 |
7 |
|
|a 10.1007/978-3-319-72359-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Information Security Practice and Experience
|h [electronic resource] :
|b 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings /
|c edited by Joseph K. Liu, Pierangela Samarati.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XVI, 907 p. 211 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10701
|
505 |
0 |
|
|a Blockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.- SocialSec track.
|
520 |
|
|
|a This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
700 |
1 |
|
|a Liu, Joseph K.
|e editor.
|
700 |
1 |
|
|a Samarati, Pierangela.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319723587
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10701
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-72359-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|