1.

Record Nr.

UNISA996466450103316

Titolo

Information and Communications Security [[electronic resource] ] : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018

ISBN

3-030-01950-0

Edizione

[1st ed. 2018.]

Descrizione fisica

1 online resource (XV, 818 p. 200 illus., 109 illus. in color.)

Collana

Security and Cryptology ; ; 11149

Disciplina

005.8

Soggetti

Data structures (Computer science)

Software engineering

Computer organization

Computers

Data Structures and Information Theory

Software Engineering/Programming and Operating Systems

Computer Systems Organization and Communication Networks

Computing Milieux

Information Systems and Communication Service

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management.

Sommario/riassunto

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain



technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.