Information and Communications Security (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
818
Utgivningsdatum
2018-10-27
Upplaga
1st ed. 2018
Förlag
Springer Nature Switzerland AG
Medarbetare
Naccache, David (ed.), Xu, Shouhuai (ed.), Qing, Sihan (ed.), Samarati, Pierangela (ed.), Blanc, Gregory (ed.)
Illustratör/Fotograf
Bibliographie
Illustrationer
109 Illustrations, color; 91 Illustrations, black and white; XV, 818 p. 200 illus., 109 illus. in co
Dimensioner
234 x 156 x 42 mm
Vikt
1149 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9783030019495

Information and Communications Security

20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

Häftad,  Engelska, 2018-10-27
1157
  • Skickas från oss inom 7-10 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Information and Communications Security Kan tyvärr inte längre levereras innan julafton.
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
Visa hela texten

Passar bra ihop

  1. Information and Communications Security
  2. +
  3. The Official Stardew Valley Cookbook

De som köpt den här boken har ofta också köpt The Official Stardew Valley Cookbook av Concernedape, Ryan Novak (inbunden).

Köp båda 2 för 1472 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Innehållsförteckning

Blockchain technology.- malware.- botnet and network security.- real-world cryptography.- encrypted computing.- privacy protection.- signature schemes.- attack analysis and detection.- searchable encryption and identity-based cryptography.- verifiable storage and computing.- applied cryptography.- supporting techniques.- formal analysis and cryptanalysis.- attack detection.- security management.