Atjaunināt sīkdatņu piekrišanu

Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings 2018 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 818 pages, height x width: 235x155 mm, weight: 1258 g, 109 Illustrations, color; 91 Illustrations, black and white; XV, 818 p. 200 illus., 109 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11149
  • Izdošanas datums: 27-Oct-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030019497
  • ISBN-13: 9783030019495
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 818 pages, height x width: 235x155 mm, weight: 1258 g, 109 Illustrations, color; 91 Illustrations, black and white; XV, 818 p. 200 illus., 109 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11149
  • Izdošanas datums: 27-Oct-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030019497
  • ISBN-13: 9783030019495
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.

The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Blockchain technology.- malware.- botnet and network security.- real-world cryptography.- encrypted computing.- privacy protection.- signature schemes.- attack analysis and detection.- searchable encryption and identity-based cryptography.- verifiable storage and computing.- applied cryptography.- supporting techniques.- formal analysis and cryptanalysis.- attack detection.- security management.