000800127 000__ 03032cam\a2200577Mi\4500 000800127 001__ 800127 000800127 005__ 20230306143702.0 000800127 006__ m\\\\\o\\d\\\\\\\\ 000800127 007__ cr\un\nnnunnun 000800127 008__ 170811s2017\\\\gw\\\\\\o\\\\\000\0\eng\d 000800127 019__ $$a1003065184$$a1003087660$$a1003192713 000800127 020__ $$a9783319664026 000800127 020__ $$a3319664026 000800127 020__ $$z9783319664019 000800127 020__ $$z3319664018 000800127 0247_ $$a10.1007/978-3-319-66402-6$$2doi 000800127 035__ $$aSP(OCoLC)on1005006002 000800127 035__ $$aSP(OCoLC)1005006002$$z(OCoLC)1003065184$$z(OCoLC)1003087660$$z(OCoLC)1003192713 000800127 040__ $$aAZU$$beng$$erda$$cAZU$$dGW5XE$$dYDX$$dUPM$$dNOC$$dDKDLA$$dNJR 000800127 049__ $$aISEA 000800127 050_4 $$aQA76.9.A25 000800127 08204 $$a005.8$$223 000800127 1112_ $$aEuropean Symposium on Research in Computer Security$$n(22nd :$$d2017 :$$cOslo, Norway),$$eauthor. 000800127 24500 $$aComputer Security - ESORICS 2017 :$$b22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I /$$cedited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes. 000800127 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2017. 000800127 300__ $$a1 online resource (xxi, 485 pages) :$$billustrations. 000800127 336__ $$atext$$btxt$$2rdacontent 000800127 337__ $$acomputer$$bc$$2rdamedia 000800127 338__ $$aonline resource$$bcr$$2rdacarrier 000800127 347__ $$atext file$$bPDF$$2rda 000800127 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10492 000800127 5050_ $$aData protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. 000800127 506__ $$aAccess limited to authorized users. 000800127 520__ $$aThe two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive. 000800127 650_0 $$aComputer science. 000800127 650_0 $$aComputer security. 000800127 650_0 $$aData encryption (Computer science) 000800127 650_0 $$aAlgorithms. 000800127 650_0 $$aComputers and civilization. 000800127 650_0 $$aComputers. 000800127 650_0 $$aLaw and legislation. 000800127 650_0 $$aManagement information systems. 000800127 7001_ $$aFoley, Simon N.,$$eeditor. 000800127 7001_ $$aGollmann, Dieter.$$eeditor. 000800127 7001_ $$aSnekkenes, Einar.$$eeditor. 000800127 77608 $$iPrint version:$$z9783319664019 000800127 830_0 $$aLecture notes in computer science ;$$v10492. 000800127 852__ $$bebk 000800127 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-66402-6$$zOnline Access$$91397441.1 000800127 909CO $$ooai:library.usi.edu:800127$$pGLOBAL_SET 000800127 980__ $$aEBOOK 000800127 980__ $$aBIB 000800127 982__ $$aEbook 000800127 983__ $$aOnline 000800127 994__ $$a92$$bISE