LEADER 03754nam 22006735 450 001 9910303445403321 005 20200630224701.0 010 $a3-030-01701-X 024 7 $a10.1007/978-3-030-01701-9 035 $a(CKB)4100000007335171 035 $a(DE-He213)978-3-030-01701-9 035 $a(MiAaPQ)EBC6244007 035 $a(PPN)232964777 035 $a(EXLCZ)994100000007335171 100 $a20181228d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $e14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I /$fedited by Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 607 p. 204 illus., 136 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v254 311 $a3-030-01700-1 320 $aIncludes bibliographical references and index. 327 $aIoT security -- user and data privacy -- mobile security -- wireless security -- software security -- cloud security -- social network and enterprise security -- network security -- applied cryptography -- web security. 330 $aThis two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v254 606 $aComputer security 606 $aComputer organization 606 $aComputers 606 $aData structures (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 615 0$aComputer security. 615 0$aComputer organization. 615 0$aComputers. 615 0$aData structures (Computer science). 615 14$aSystems and Data Security. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputing Milieux. 615 24$aData Structures and Information Theory. 676 $a005.8 676 $a005.8 702 $aBeyah$b Raheem$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChang$b Bing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Yingjiu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhu$b Sencun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910303445403321 996 $aSecurity and Privacy in Communication Networks$93012314 997 $aUNINA