Coverart for item
The Resource Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi, (electronic resource)

Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi, (electronic resource)

Label
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
Title
Information and Communications Security
Title remainder
20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
Statement of responsibility
edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
Contributor
Editor
Subject
Language
eng
Summary
  • This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management
  • This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management
Member of
Is part of
Dewey number
005.74
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
  • IyQGyhhy3wg
  • atzG4qYRYCk
  • ss0vA8nzZ2A
  • lO4Yd3nndaY
  • KKDF1tLJCHA
  • Xf6ZtF9btrw
  • EkLFvJ0Tax4
  • gD901FZkR3M
LC call number
QA76.9.D35
http://library.link/vocab/relatedWorkOrContributorName
  • Naccache, David
  • Xu, Shouhuai
  • Qing, Sihan
  • Samarati, Pierangela
  • Blanc, Gregory
  • Lu, Rongxing
  • Zhang, Zonghua
  • Meddahi, Ahmed
  • SpringerLink (Online service)
Series statement
Security and Cryptology
Series volume
11149
http://library.link/vocab/subjectName
  • Data structures (Computer scienc
  • Software engineering
  • Computer network architectures
  • Computer science
  • Information systems
  • Data Structures, Cryptology and Information Theory
  • Software Engineering/Programming and Operating Systems
  • Computer Systems Organization and Communication Networks
  • Computing Milieux
  • Information Systems and Communication Service
Label
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi, (electronic resource)
Instantiates
Publication
Contents
  • Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management
  • Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management
Control code
OCM1bookssj0002089742
Dimensions
unknown
Isbn
9783030019501
Other control number
10.1007/978-3-030-01950-1
Specific material designation
remote
System control number
(WaSeSS)bookssj0002089742
Label
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi, (electronic resource)
Publication
Contents
  • Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management
  • Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management
Control code
OCM1bookssj0002089742
Dimensions
unknown
Isbn
9783030019501
Other control number
10.1007/978-3-030-01950-1
Specific material designation
remote
System control number
(WaSeSS)bookssj0002089742

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...