000 | 03320nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-030-20951-3 | ||
003 | DE-He213 | ||
005 | 20240730170119.0 | ||
007 | cr nn 008mamaa | ||
008 | 190518s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030209513 _9978-3-030-20951-3 |
||
024 | 7 |
_a10.1007/978-3-030-20951-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCyber Security Cryptography and Machine Learning _h[electronic resource] : _bThird International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings / _cedited by Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXIII, 330 p. 141 illus., 76 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11527 |
|
520 | _aThis book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _992120 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aDolev, Shlomi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992121 |
|
700 | 1 |
_aHendler, Danny. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992122 |
|
700 | 1 |
_aLodha, Sachin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992123 |
|
700 | 1 |
_aYung, Moti. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992124 |
|
710 | 2 |
_aSpringerLink (Online service) _992125 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030209506 |
776 | 0 | 8 |
_iPrinted edition: _z9783030209520 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11527 _992126 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-20951-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86746 _d86746 |