LEADER 03917nam 22007455 450 001 996466317303316 005 20200702134159.0 010 $a3-030-05171-4 024 7 $a10.1007/978-3-030-05171-6 035 $a(CKB)4100000007204829 035 $a(DE-He213)978-3-030-05171-6 035 $a(MiAaPQ)EBC6248180 035 $a(PPN)232963819 035 $a(EXLCZ)994100000007204829 100 $a20181205d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security$b[electronic resource] $e14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /$fedited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIX, 481 p. 134 illus., 83 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11281 311 $a3-030-05170-6 320 $aIncludes bibliographical references and index. 327 $aSecurity for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication. 410 0$aSecurity and Cryptology ;$v11281 606 $aData protection 606 $aComputers 606 $aOptical data processing 606 $aSoftware engineering 606 $aComputer communication systems 606 $aComputer system failures 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aImage Processing and Computer Vision$3https://scigraph.springernature.com/ontologies/product-market-codes/I22021 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 615 0$aData protection. 615 0$aComputers. 615 0$aOptical data processing. 615 0$aSoftware engineering. 615 0$aComputer communication systems. 615 0$aComputer system failures. 615 14$aSecurity. 615 24$aComputing Milieux. 615 24$aImage Processing and Computer Vision. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aSystem Performance and Evaluation. 676 $a005.8 702 $aGanapathy$b Vinod$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJaeger$b Trent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShyamasundar$b R.K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466317303316 996 $aInformation Systems Security$9771916 997 $aUNISA