|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910303445303321 |
|
|
Titolo |
Security and Privacy in Communication Networks : 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II / / edited by Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2018.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVIII, 525 p. 150 illus., 89 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, , 1867-8211 ; ; 255 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer organization |
Computers |
Data structures (Computer science) |
Systems and Data Security |
Computer Systems Organization and Communication Networks |
Computing Milieux |
Data Structures and Information Theory |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
IoT security -- user and data privacy -- mobile security -- wireless security -- software security -- cloud security -- social network and enterprise security -- network security -- applied cryptography -- web security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied |
|
|
|
|
|
|
|
|
|
|
cryptography, and web security. |
|
|
|
|
|
| |