000845719 000__ 03005cam\a2200553Mi\4500 000845719 001__ 845719 000845719 005__ 20230306145033.0 000845719 006__ m\\\\\o\\d\\\\\\\\ 000845719 007__ cr\nn\nnnunnun 000845719 008__ 180806s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000845719 019__ $$a1048596239$$a1050570769$$a1054338804 000845719 020__ $$a9783319989891 000845719 020__ $$a3319989898 000845719 020__ $$z9783319989884 000845719 020__ $$z3319990721 000845719 0247_ $$a10.1007/978-3-319-98989-1$$2doi 000845719 035__ $$aSP(OCoLC)on1049849036 000845719 035__ $$aSP(OCoLC)1049849036$$z(OCoLC)1048596239$$z(OCoLC)1050570769$$z(OCoLC)1054338804 000845719 040__ $$aUCW$$beng$$cUCW$$dOCLCO$$dGW5XE$$dYDX$$dUAB 000845719 049__ $$aISEA 000845719 050_4 $$aQA76.9.A25 000845719 08204 $$a005.8$$223 000845719 24500 $$aComputer Security :$$b23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II /$$cedited by Javier Lopez, Jianying Zhou, Miguel Soriano. 000845719 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000845719 300__ $$a1 online resource (xix, 571 pages) :$$billustrations. 000845719 336__ $$atext$$btxt$$2rdacontent 000845719 337__ $$acomputer$$bc$$2rdamedia 000845719 338__ $$aonline resource$$bcr$$2rdacarrier 000845719 347__ $$atext file$$bPDF$$2rda 000845719 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v11099 000845719 5050_ $$aSoftware security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). 000845719 506__ $$aAccess limited to authorized users. 000845719 520__ $$aThe two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 000845719 650_0 $$aComputer science. 000845719 650_0 $$aComputer organization. 000845719 650_0 $$aComputer security. 000845719 650_0 $$aData encryption (Computer science) 000845719 650_0 $$aComputers. 000845719 650_0 $$aComputers and civilization. 000845719 650_0 $$aLaw and legislation. 000845719 7001_ $$aLopez, Javier.$$eeditor. 000845719 7001_ $$aZhou, Jianying.$$eeditor. 000845719 7001_ $$aSoriano, Miguel.$$eeditor. 000845719 77608 $$iPrint version:$$z9783319989884 000845719 830_0 $$aLecture notes in computer science ;$$v11099. 000845719 85280 $$bebk$$hSpringerLink 000845719 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-98989-1$$zOnline Access$$91397441.1 000845719 909CO $$ooai:library.usi.edu:845719$$pGLOBAL_SET 000845719 980__ $$aEBOOK 000845719 980__ $$aBIB 000845719 982__ $$aEbook 000845719 983__ $$aOnline 000845719 994__ $$a92$$bISE