LEADER 03080nam 22007215 450 001 9910349434103321 005 20251225203636.0 010 $a9783319935249 010 $a3319935240 024 7 $a10.1007/978-3-319-93524-9 035 $a(CKB)3810000000358673 035 $a(DE-He213)978-3-319-93524-9 035 $a(MiAaPQ)EBC6285885 035 $a(PPN)229494447 035 $a(EXLCZ)993810000000358673 100 $a20180620d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28?29, 2017, Proceedings /$fedited by Gerhard P. Hancke, Ernesto Damiani 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 189 p. 56 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10741 311 08$a9783319935232 311 08$a3319935232 320 $aIncludes bibliographical references and index. 330 $aThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10741 606 $aData protection 606 $aApplication software 606 $aComputers, Special purpose 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Communication Networks 606 $aCryptology 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers, Special purpose. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aHancke$b Gerhard P$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349434103321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA