000 | 03221nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-30215-3 | ||
003 | DE-He213 | ||
005 | 20240730171020.0 | ||
007 | cr nn 008mamaa | ||
008 | 190826s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030302153 _9978-3-030-30215-3 |
||
024 | 7 |
_a10.1007/978-3-030-30215-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security _h[electronic resource] : _b22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings / _cedited by Zhiqiang Lin, Charalampos Papamanthou, Michalis Polychronakis. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXI, 488 p. 247 illus., 99 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11723 |
|
505 | 0 | _aAttacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning and Security -- Crypto II: Zero-Knowledge Proofs -- Defenses -- Web Security -- Side Channels -- Malware Analysis -- Crypto III: Signatures and Authentication. | |
520 | _aThis book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aComputer Communication Networks. _996754 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
700 | 1 |
_aLin, Zhiqiang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996755 |
|
700 | 1 |
_aPapamanthou, Charalampos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996757 |
|
700 | 1 |
_aPolychronakis, Michalis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996758 |
|
710 | 2 |
_aSpringerLink (Online service) _996759 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030302146 |
776 | 0 | 8 |
_iPrinted edition: _z9783030302160 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11723 _996761 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-30215-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87355 _d87355 |