|
|
|
|
LEADER |
04843nam a22006615i 4500 |
001 |
978-3-030-01950-1 |
003 |
DE-He213 |
005 |
20210624233432.0 |
007 |
cr nn 008mamaa |
008 |
181026s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030019501
|9 978-3-030-01950-1
|
024 |
7 |
|
|a 10.1007/978-3-030-01950-1
|2 doi
|
050 |
|
4 |
|a QA76.9.D35
|
050 |
|
4 |
|a Q350-390
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a GPF
|2 thema
|
082 |
0 |
4 |
|a 005.73
|2 23
|
245 |
1 |
0 |
|a Information and Communications Security
|h [electronic resource] :
|b 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings /
|c edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XV, 818 p. 200 illus., 109 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11149
|
505 |
0 |
|
|a Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Data Structures and Information Theory.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I15009
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I14002
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13006
|
650 |
2 |
4 |
|a Computing Milieux.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24008
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18008
|
700 |
1 |
|
|a Naccache, David.
|e editor.
|0 (orcid)0000-0002-8651-6555
|1 https://orcid.org/0000-0002-8651-6555
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Xu, Shouhuai.
|e editor.
|0 (orcid)0000-0001-8034-0942
|1 https://orcid.org/0000-0001-8034-0942
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Qing, Sihan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Samarati, Pierangela.
|e editor.
|0 (orcid)0000-0001-7395-4620
|1 https://orcid.org/0000-0001-7395-4620
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Blanc, Gregory.
|e editor.
|0 (orcid)0000-0001-8150-6617
|1 https://orcid.org/0000-0001-8150-6617
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lu, Rongxing.
|e editor.
|0 (orcid)0000-0001-5720-0941
|1 https://orcid.org/0000-0001-5720-0941
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhang, Zonghua.
|e editor.
|0 (orcid)0000-0003-0379-7089
|1 https://orcid.org/0000-0003-0379-7089
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Meddahi, Ahmed.
|e editor.
|0 (orcid)0000-0002-9255-2114
|1 https://orcid.org/0000-0002-9255-2114
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030019495
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030019518
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11149
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-01950-1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|