LEADER 03393nam 22007695 450 001 9910364954603321 005 20251225200656.0 010 $a3-030-36945-5 024 7 $a10.1007/978-3-030-36945-3 035 $a(CKB)4100000010013764 035 $a(MiAaPQ)EBC6300595 035 $a(DE-He213)978-3-030-36945-3 035 $a(PPN)242818544 035 $a(MiAaPQ)EBC6275375 035 $a(EXLCZ)994100000010013764 100 $a20191202d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security $e15th International Conference, ICISS 2019, Hyderabad, India, December 16?20, 2019, Proceedings /$fedited by Deepak Garg, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (xviii, 345 pages) $cillustrations 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11952 300 $aIncludes index. 311 08$a3-030-36944-7 327 $aSmart contracts -- Formal techniques -- Access control -- Machine learning -- Distributed systems -- Cryptography -- Online social networks -- Images and cryptography. 330 $aThis book constitutes the proceedings of the 15th International Conference on Information Systems Security, ICISS 2019, held in Hyderabad, India, in December 2019. The 13 revised full papers and 4 short papers presented in this book together with 4 abstracts of invited talks were carefully reviewed and selected from 63 submissions. The papers cover topics such as: smart contracts; formal techniques; access control; machine learning; distributed systems; cryptography; online social networks; images and cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11952 606 $aData protection 606 $aComputer vision 606 $aComputer networks 606 $aComputers, Special purpose 606 $aApplication software 606 $aDatabase management 606 $aData and Information Security 606 $aComputer Vision 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer and Information Systems Applications 606 $aDatabase Management 615 0$aData protection. 615 0$aComputer vision. 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aApplication software. 615 0$aDatabase management. 615 14$aData and Information Security. 615 24$aComputer Vision. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer and Information Systems Applications. 615 24$aDatabase Management. 676 $a005.8 676 $a005.8 702 $aGarg$b Deepak$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKumar$b N. V. Narendra$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShyamasundar$b Rudrapatna K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910364954603321 996 $aInformation Systems Security$93660336 997 $aUNINA