Information and Communications Security [electronic resource] : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi.
Contributor(s): Naccache, David [editor.] | Xu, Shouhuai [editor.] | Qing, Sihan [editor.] | Samarati, Pierangela [editor.] | Blanc, Gregory [editor.] | Lu, Rongxing [editor.] | Zhang, Zonghua [editor.] | Meddahi, Ahmed [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 11149Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XV, 818 p. 200 illus., 109 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030019501.Subject(s): Data structures (Computer science) | Information theory | Software engineering | Computer engineering | Computer networks | Computers | Data Structures and Information Theory | Software Engineering | Computer Engineering and Networks | Computing Milieux | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.73 | 003.54 Online resources: Click here to access onlineBlockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management.
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
There are no comments for this item.