001443858 000__ 04305cam\a2200685Ii\4500 001443858 001__ 1443858 001443858 003__ OCoLC 001443858 005__ 20230310003605.0 001443858 006__ m\\\\\o\\d\\\\\\\\ 001443858 007__ cr\un\nnnunnun 001443858 008__ 220126s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001443858 019__ $$a1293846575$$a1293894038 001443858 020__ $$a9783030949006$$q(electronic bk.) 001443858 020__ $$a3030949001$$q(electronic bk.) 001443858 020__ $$z9783030948993 001443858 020__ $$z3030948994 001443858 0247_ $$a10.1007/978-3-030-94900-6$$2doi 001443858 035__ $$aSP(OCoLC)1293768387 001443858 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dOCLCO$$dOCLCF$$dOCLCO$$dOCLCQ 001443858 049__ $$aISEA 001443858 050_4 $$aQA76.9.A25$$bI35 2020 001443858 08204 $$a005.8$$223 001443858 1112_ $$aICISSP (Conference)$$n(6th :$$d2020 :$$cValletta, Malta) 001443858 24510 $$aInformation systems and privacy :$$b6th international conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020 : revised selected papers /$$cSteven Furnell, Paolo Mori, Edgar Weippl, Olivier Camp (eds.). 001443858 24630 $$aICISSP 2020 001443858 264_1 $$aCham :$$bSpringer,$$c[2022] 001443858 264_4 $$c©2022 001443858 300__ $$a1 online resource :$$billustrations (some color). 001443858 336__ $$atext$$btxt$$2rdacontent 001443858 337__ $$acomputer$$bc$$2rdamedia 001443858 338__ $$aonline resource$$bcr$$2rdacarrier 001443858 4901_ $$aCommunications in computer and information science,$$x1865-0937 ;$$v1545 001443858 500__ $$aInternational conference proceedings. 001443858 500__ $$aIncludes author index. 001443858 5050_ $$aInferring Sensitive Information in Cryptocurrency Off-chain Networks using Probing and Timing Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP Ledger: Insights and Analysis -- End To End Autorship Email Verification Framework for a Secure Communication -- Symmetric and Asymmetric Schemes for Lightweight Secure Communication -- Credential Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement in the Lightning Network Protocol -- Effects of Explanatory Information on Privacy Policy Summarization Tool Perception -- Harmonic Group Mix: A Framework for Anonymous and Authenticated Broadcast Messages in Vehicle-to-Vehicle Environments -- Contextual Factors in Information Security Group Behaviour: A Comparison of Two Studies -- Using MedBIoT Dataset to Build Eective Machine Learning-based IoT Botnet Detection Systems. 001443858 506__ $$aAccess limited to authorized users. 001443858 520__ $$aThis book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness. 001443858 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 1, 2022). 001443858 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001443858 650_0 $$aData encryption (Computer science)$$vCongresses. 001443858 650_0 $$aData protection$$vCongresses. 001443858 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001443858 650_6 $$aChiffrement (Informatique)$$vCongrès. 001443858 650_6 $$aProtection de l'information (Informatique)$$vCongrès. 001443858 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001443858 655_7 $$aConference papers and proceedings.$$2lcgft 001443858 655_7 $$aActes de congrès.$$2rvmgf 001443858 655_0 $$aElectronic books. 001443858 7001_ $$aFurnell, Steven,$$d1970-$$eeditor. 001443858 7001_ $$aMori, Paolo$$c(Computer scientist),$$eeditor. 001443858 7001_ $$aWeippl, Edgar R.,$$eeditor. 001443858 7001_ $$aCamp, Olivier,$$eeditor. 001443858 77608 $$iPrint version: $$z3030948994$$z9783030948993$$w(OCoLC)1289363482 001443858 830_0 $$aCommunications in computer and information science ;$$v1545.$$x1865-0937 001443858 852__ $$bebk 001443858 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-94900-6$$zOnline Access$$91397441.1 001443858 909CO $$ooai:library.usi.edu:1443858$$pGLOBAL_SET 001443858 980__ $$aBIB 001443858 980__ $$aEBOOK 001443858 982__ $$aEbook 001443858 983__ $$aOnline 001443858 994__ $$a92$$bISE