LEADER 03375nam 22006735 450 001 996465785803316 005 20200701050138.0 010 $a3-319-93524-0 024 7 $a10.1007/978-3-319-93524-9 035 $a(CKB)3810000000358673 035 $a(DE-He213)978-3-319-93524-9 035 $a(MiAaPQ)EBC6285885 035 $a(PPN)229494447 035 $a(EXLCZ)993810000000358673 100 $a20180620d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice$b[electronic resource] $e11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28?29, 2017, Proceedings /$fedited by Gerhard P. Hancke, Ernesto Damiani 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 189 p. 56 illus.) 225 1 $aSecurity and Cryptology ;$v10741 311 $a3-319-93523-2 320 $aIncludes bibliographical references and index. 330 $aThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. 410 0$aSecurity and Cryptology ;$v10741 606 $aComputer security 606 $aApplication software 606 $aSpecial purpose computers 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aApplication software. 615 0$aSpecial purpose computers. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aHancke$b Gerhard P$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465785803316 996 $aInformation Security Theory and Practice$92073240 997 $aUNISA