My Account Log in

1 option

Information Systems Security : 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings / edited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Ganapathy, Vinod, Editor.
Jaeger, Trent, Editor.
Shyamasundar, R.K., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11281
Security and Cryptology ; 11281
Language:
English
Subjects (All):
Data protection.
Computers.
Computer vision.
Software engineering.
Computer networks.
Electronic digital computers-Evaluation.
Data and Information Security.
Computing Milieux.
Computer Vision.
Software Engineering.
Computer Communication Networks.
System Performance and Evaluation.
Local Subjects:
Data and Information Security.
Computing Milieux.
Computer Vision.
Software Engineering.
Computer Communication Networks.
System Performance and Evaluation.
Physical Description:
1 online resource (XIX, 481 pages) : 134 illustrations, 83 illustrations in color.
Edition:
1st ed. 2018.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
Contents:
Security for ubiquitous computing
Modelling and anaylsis of attacks
Smartphone security
Cryptography and theory
Enterprise and cloud security
Machine learning and security
Privacy
Client security and authentication.
Other Format:
Printed edition:
ISBN:
978-3-030-05171-6
9783030051716
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account