My Account Log in

1 option

Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / edited by Javier Lopez, Jianying Zhou, Miguel Soriano.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Lopez, Javier, editor.
Zhou, Jianying, editor.
Soriano, Miguel, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11099.
Security and Cryptology ; 11099
Language:
English
Subjects (All):
Computer security.
Data encryption (Computer science).
Computers and civilization.
Computers.
Law and legislation.
Computer organization.
Systems and Data Security.
Cryptology.
Computers and Society.
Legal Aspects of Computing.
Computer Systems Organization and Communication Networks.
Information Systems and Communication Service.
Local Subjects:
Systems and Data Security.
Cryptology.
Computers and Society.
Legal Aspects of Computing.
Computer Systems Organization and Communication Networks.
Information Systems and Communication Service.
Physical Description:
1 online resource (XIX, 571 pages) : 104 illustrations.
Edition:
First edition 2018.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. .
Contents:
Software security
Blockchain and machine Learning
Hardware security
Attacks
Malware and vulnerabilities
Protocol security
Privacy (I)
CPS and IoT security
Mobile security
Database and web security
Cloud security
Applied crypto (I)
Privacy (II)
Multi-party computation
SDN security
Applied crypto (II).
Other Format:
Printed edition:
ISBN:
978-3-319-98989-1
9783319989891
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account