My Account Log in

1 option

Information Systems Security : 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings / edited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar.

SpringerLink Books Computer Science (2011-2024) Available online

SpringerLink Books Computer Science (2011-2024)
Format:
Book
Contributor:
Garg, Deepak, Editor.
Kumar, N. V. Narendra, Editor.
Shyamasundar, Rudrapatna K., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11952
Security and Cryptology ; 11952
Language:
English
Subjects (All):
Data protection.
Computer vision.
Computer networks.
Computers, Special purpose.
Application software.
Database management.
Data and Information Security.
Computer Vision.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Computer and Information Systems Applications.
Database Management.
Local Subjects:
Data and Information Security.
Computer Vision.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Computer and Information Systems Applications.
Database Management.
Physical Description:
1 online resource (XVIII, 345 pages) : 189 illustrations, 45 illustrations in color.
Edition:
1st ed. 2019.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019. The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions. The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography.
Contents:
Smart contracts
Formal techniques
Access control
Machine learning
Distributed systems
Cryptography
Online social networks
Images and cryptography.
Other Format:
Printed edition:
ISBN:
978-3-030-36945-3
9783030369453
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account