000 | 02920nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-20074-9 | ||
003 | DE-He213 | ||
005 | 20240730170257.0 | ||
007 | cr nn 008mamaa | ||
008 | 190511s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030200749 _9978-3-030-20074-9 |
||
024 | 7 |
_a10.1007/978-3-030-20074-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security Theory and Practice _h[electronic resource] : _b12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers / _cedited by Olivier Blazy, Chan Yeob Yeun. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXII, 223 p. 58 illus., 21 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11469 |
|
505 | 0 | _aReal world -- Cryptography -- Artificial learning -- Cybersecurity -- Internet of things. | |
520 | _aThis volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018. The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aComputer Communication Networks. _992663 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aBlazy, Olivier. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992664 |
|
700 | 1 |
_aYeun, Chan Yeob. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _992665 |
|
710 | 2 |
_aSpringerLink (Online service) _992666 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030200732 |
776 | 0 | 8 |
_iPrinted edition: _z9783030200756 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11469 _992667 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-20074-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86825 _d86825 |