9783030019495-3030019497-Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Lecture Notes in Computer Science, 11149)

Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Lecture Notes in Computer Science, 11149)

ISBN-13: 9783030019495
ISBN-10: 3030019497
Edition: 1st ed. 2018
Author: Pierangela Samarati, David Naccache, Sihan Qing, Rongxing Lu, Gregory Blanc, Shouhuai Xu, Zonghua Zhang, Ahmed Meddahi
Publication date: 2018
Publisher: Springer
Format: Paperback 833 pages
FREE US shipping
Buy

From $29.70

Book details

ISBN-13: 9783030019495
ISBN-10: 3030019497
Edition: 1st ed. 2018
Author: Pierangela Samarati, David Naccache, Sihan Qing, Rongxing Lu, Gregory Blanc, Shouhuai Xu, Zonghua Zhang, Ahmed Meddahi
Publication date: 2018
Publisher: Springer
Format: Paperback 833 pages

Summary

Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Lecture Notes in Computer Science, 11149) (ISBN-13: 9783030019495 and ISBN-10: 3030019497), written by authors Pierangela Samarati, David Naccache, Sihan Qing, Rongxing Lu, Gregory Blanc, Shouhuai Xu, Zonghua Zhang, Ahmed Meddahi, was published by Springer in 2018. With an overall rating of 4.5 stars, it's a notable title among other books. You can easily purchase or rent Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Lecture Notes in Computer Science, 11149) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.

The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book