1 option
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / edited by Javier Lopez, Jianying Zhou, Miguel Soriano.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 11099.
- Security and Cryptology ; 11099
- Language:
- English
- Subjects (All):
- Computer security.
- Data encryption (Computer science).
- Computers and civilization.
- Computers.
- Law and legislation.
- Computer organization.
- Systems and Data Security.
- Cryptology.
- Computers and Society.
- Legal Aspects of Computing.
- Computer Systems Organization and Communication Networks.
- Information Systems and Communication Service.
- Local Subjects:
- Systems and Data Security.
- Cryptology.
- Computers and Society.
- Legal Aspects of Computing.
- Computer Systems Organization and Communication Networks.
- Information Systems and Communication Service.
- Physical Description:
- 1 online resource (XIX, 571 pages) : 104 illustrations.
- Edition:
- First edition 2018.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2018.
- System Details:
- text file PDF
- Summary:
- The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. .
- Contents:
- Software security
- Blockchain and machine Learning
- Hardware security
- Attacks
- Malware and vulnerabilities
- Protocol security
- Privacy (I)
- CPS and IoT security
- Mobile security
- Database and web security
- Cloud security
- Applied crypto (I)
- Privacy (II)
- Multi-party computation
- SDN security
- Applied crypto (II).
- Other Format:
- Printed edition:
- ISBN:
- 978-3-319-98989-1
- 9783319989891
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.