Cantitate/Preț
Produs

Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11149

Editat de David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
en Limba Engleză Paperback – 27 oct 2018
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 63656 lei

Preț vechi: 79570 lei
-20% Nou

Puncte Express: 955

Preț estimativ în valută:
12185 13101$ 10158£

Carte tipărită la comandă

Livrare economică 19 decembrie 24 - 02 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030019495
ISBN-10: 3030019497
Pagini: 833
Ilustrații: XV, 818 p. 200 illus., 109 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.15 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Blockchain technology.- malware.- botnet and network security.- real-world cryptography.- encrypted computing.- privacy protection.- signature schemes.- attack analysis and detection.- searchable encryption and identity-based cryptography.- verifiable storage and computing.- applied cryptography.- supporting techniques.- formal analysis and cryptanalysis.- attack detection.- security management.