LEADER 00958nam0-22003131i-450- 001 990004025530403321 005 19990530 010 $a0-907628-55-9 035 $a000402553 035 $aFED01000402553 035 $a(Aleph)000402553FED01 035 $a000402553 100 $a19990530d19------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aBooks, collectors and libraries$eStudies in the medieval heritage$fN.R. Ker$gedited by Andrew G. Watson 210 $aLondon and Ronceverte$cThe Hambledon Press$d19 215 $aXIV, 528 p.$d24 cm 225 1 $aHistory series$v36 225 1 $aLiterature Series$v2 700 1$aKer,$bNeil Ripley$0152996 702 1$aWatson,$bAndrew George$f<1924- > 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004025530403321 952 $a027.041 KER$bBIBL. C. 1183$fFLFBC 959 $aFLFBC 996 $aBooks, collectors and libraries$9470314 997 $aUNINA LEADER 02895nam 22006735 450 001 9910337840303321 005 20251225195026.0 010 $a3-030-20074-4 024 7 $a10.1007/978-3-030-20074-9 035 $a(CKB)4100000008160639 035 $a(DE-He213)978-3-030-20074-9 035 $a(MiAaPQ)EBC5926000 035 $a(PPN)236522108 035 $a(EXLCZ)994100000008160639 100 $a20190511d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10?11, 2018, Revised Selected Papers /$fedited by Olivier Blazy, Chan Yeob Yeun 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XII, 223 p. 58 illus., 21 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11469 300 $aIncludes Index. 311 08$a3-030-20073-6 327 $aReal world -- Cryptography -- Artificial learning -- Cybersecurity -- Internet of things. 330 $aThis volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018. The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11469 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputers and civilization 606 $aData and Information Security 606 $aMobile and Network Security 606 $aSecurity Services 606 $aComputer Communication Networks 606 $aComputers and Society 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputers and civilization. 615 14$aData and Information Security. 615 24$aMobile and Network Security. 615 24$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aComputers and Society. 676 $a005.8 676 $a005.8 702 $aBlazy$b Olivier$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYeun$b Chan Yeob$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337840303321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA