LEADER 04508nam 22007335 450 001 996466450103316 005 20200630211559.0 010 $a3-030-01950-0 024 7 $a10.1007/978-3-030-01950-1 035 $a(CKB)4100000007110788 035 $a(DE-He213)978-3-030-01950-1 035 $a(MiAaPQ)EBC6243633 035 $a(PPN)231460945 035 $a(EXLCZ)994100000007110788 100 $a20181026d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security$b[electronic resource] $e20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings /$fedited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XV, 818 p. 200 illus., 109 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11149 300 $aIncludes index. 311 $a3-030-01949-7 327 $aBlockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. 330 $aThis book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management. 410 0$aSecurity and Cryptology ;$v11149 606 $aData structures (Computer science) 606 $aSoftware engineering 606 $aComputer organization 606 $aComputers 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aData structures (Computer science). 615 0$aSoftware engineering. 615 0$aComputer organization. 615 0$aComputers. 615 14$aData Structures and Information Theory. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputing Milieux. 615 24$aInformation Systems and Communication Service. 676 $a005.8 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Shouhuai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aQing$b Sihan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBlanc$b Gregory$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLu$b Rongxing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Zonghua$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeddahi$b Ahmed$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466450103316 996 $aInformation and Communications Security$9771899 997 $aUNISA LEADER 01555nam 2200373Ia 450 001 996397381203316 005 20200824132230.0 035 $a(CKB)4940000000059562 035 $a(EEBO)2240862413 035 $a(OCoLC)ocm15612424e 035 $a(OCoLC)15612424 035 $a(EXLCZ)994940000000059562 100 $a19870430d1674 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aBy the King, a proclamation enjoyning the prosecution of all such persons as shall make or utter any farthings, half-pence, or pence of brass, or other base metals with private stamps$b[electronic resource] 210 $aLondon $cPrinted by the assigns of John Bill and Christopher Barker ...$d1674 215 $a1 broadside 300 $a"Given at our court at Whitehall the fifth day of December, 1674, in the six and twentieth year of our reign." 300 $aReproduction of original in the Harvard University Library. 330 $aeebo-0062 606 $aCounterfeits and counterfeiting$zEngland 607 $aGreat Britain$xHistory$yCharles II, 1660-1685 615 0$aCounterfeits and counterfeiting 701 $aCharles$cKing of England,$f1630-1685.$0793293 801 0$bEAE 801 1$bEAE 801 2$bm/c 801 2$bEAE 801 2$bWaOLN 906 $aBOOK 912 $a996397381203316 996 $aBy the King, a proclamation enjoyning the prosecution of all such persons as shall make or utter any farthings, half-pence, or pence of brass, or other base metals with private stamps$92396669 997 $aUNISA