LEADER 04508nam 22007335 450 001 996466450103316 005 20200630211559.0 010 $a3-030-01950-0 024 7 $a10.1007/978-3-030-01950-1 035 $a(CKB)4100000007110788 035 $a(DE-He213)978-3-030-01950-1 035 $a(MiAaPQ)EBC6243633 035 $a(PPN)231460945 035 $a(EXLCZ)994100000007110788 100 $a20181026d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation and Communications Security$b[electronic resource] $e20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings /$fedited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XV, 818 p. 200 illus., 109 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11149 300 $aIncludes index. 311 $a3-030-01949-7 327 $aBlockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. 330 $aThis book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management. 410 0$aSecurity and Cryptology ;$v11149 606 $aData structures (Computer science) 606 $aSoftware engineering 606 $aComputer organization 606 $aComputers 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aData structures (Computer science). 615 0$aSoftware engineering. 615 0$aComputer organization. 615 0$aComputers. 615 14$aData Structures and Information Theory. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputing Milieux. 615 24$aInformation Systems and Communication Service. 676 $a005.8 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Shouhuai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aQing$b Sihan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBlanc$b Gregory$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLu$b Rongxing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Zonghua$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeddahi$b Ahmed$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466450103316 996 $aInformation and Communications Security$9771899 997 $aUNISA