LEADER 03528nam 22007815 450 001 9910349387303321 005 20251225205518.0 010 $a9783030051716 010 $a3030051714 024 7 $a10.1007/978-3-030-05171-6 035 $a(CKB)4100000007204829 035 $a(DE-He213)978-3-030-05171-6 035 $a(MiAaPQ)EBC6248180 035 $a(PPN)232963819 035 $a(EXLCZ)994100000007204829 100 $a20181205d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security $e14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /$fedited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIX, 481 p. 134 illus., 83 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11281 311 08$a9783030051709 311 08$a3030051706 320 $aIncludes bibliographical references and index. 327 $aSecurity for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11281 606 $aData protection 606 $aComputers 606 $aComputer vision 606 $aSoftware engineering 606 $aComputer networks 606 $aElectronic digital computers$xEvaluation 606 $aData and Information Security 606 $aComputing Milieux 606 $aComputer Vision 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aSystem Performance and Evaluation 615 0$aData protection. 615 0$aComputers. 615 0$aComputer vision. 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aElectronic digital computers$xEvaluation. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aComputer Vision. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aSystem Performance and Evaluation. 676 $a005.8 676 $a005.8 702 $aGanapathy$b Vinod$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJaeger$b Trent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShyamasundar$b R.K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349387303321 996 $aInformation Systems Security$93660336 997 $aUNINA