Information and Communications Security
20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
Seiten
2018
|
1st ed. 2018
Springer International Publishing (Verlag)
978-3-030-01949-5 (ISBN)
Springer International Publishing (Verlag)
978-3-030-01949-5 (ISBN)
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.
The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
Blockchain technology.- malware.- botnet and network security.- real-world cryptography.- encrypted computing.- privacy protection.- signature schemes.- attack analysis and detection.- searchable encryption and identity-based cryptography.- verifiable storage and computing.- applied cryptography.- supporting techniques.- formal analysis and cryptanalysis.- attack detection.- security management.
Erscheinungsdatum | 28.10.2018 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XV, 818 p. 200 illus., 109 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1258 g |
Themenwelt | Informatik ► Theorie / Studium ► Algorithmen |
Schlagworte | Applications • Artificial Intelligence • authentication • Cloud Computing • computer crime • Computer Networks • Computer Science • Computer systems • conference proceedings • cryptography • data privacy • Data Security • electronic document identification systems • Encryption • Informatics • Internet • Network Security • privacy • Public Key Cryptography • public keys (PK) • Research • Security Systems • Software engineering • structural design • wireless telecommunication systems |
ISBN-10 | 3-030-01949-7 / 3030019497 |
ISBN-13 | 978-3-030-01949-5 / 9783030019495 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media
Buch | Softcover (2021)
Springer (Verlag)
29,99 €
Interlingua zur Gewährleistung semantischer Interoperabilität in der …
Buch | Softcover (2023)
Springer Fachmedien (Verlag)
32,99 €
Eine Einführung mit Java
Buch | Hardcover (2020)
dpunkt (Verlag)
44,90 €