Data and applications security and privacy XXXV : 35th annual IFIP WG 11.3 conference, DBSec 2021, Calgary, Canada, July 19-20, 2021 : proceedings / Ken Barker, Kambiz Ghazinour (eds.).
2021
QA76.9.A25
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Data and applications security and privacy XXXV : 35th annual IFIP WG 11.3 conference, DBSec 2021, Calgary, Canada, July 19-20, 2021 : proceedings / Ken Barker, Kambiz Ghazinour (eds.).
Meeting Name
ISBN
9783030812423 (electronic bk.)
3030812421 (electronic bk.)
9783030812416
3030812413
3030812421 (electronic bk.)
9783030812416
3030812413
Published
Cham : Springer, [2021]
Copyright
©2021
Language
English
Description
1 online resource : illustrations (some color)
Item Number
10.1007/978-3-030-81242-3 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.* The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file
PDF
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed July 29, 2021).
Added Author
Series
Lecture notes in computer science ; 12840.
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
LNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI.
Linked Resources
Record Appears in
Table of Contents
Differential Privacy
Cryptology I
Cryptology II
Machine Learning
Potpourri I
Potpourri II
Access Control.
Cryptology I
Cryptology II
Machine Learning
Potpourri I
Potpourri II
Access Control.