Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / edited by Javier Lopez, Jianying Zhou, Miguel Soriano.
2018
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / edited by Javier Lopez, Jianying Zhou, Miguel Soriano.
ISBN
9783319989891
3319989898
9783319989884
3319990721
3319989898
9783319989884
3319990721
Published
Cham : Springer International Publishing : Imprint: Springer, 2018.
Language
English
Description
1 online resource (xix, 571 pages) : illustrations.
Item Number
10.1007/978-3-319-98989-1 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Series
Lecture notes in computer science ; 11099.
Available in Other Form
Print version: 9783319989884
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Software security
Blockchain & machine Learning
Hardware security
Attacks
Malware & vulnerabilities
Protocol security
Privacy (I)
CPS and IoT security
Mobile security
Database & web security
Cloud security
Applied crypto (I)
Privacy (II)
Multi-party computation
SDN security
Applied crypto (II).
Blockchain & machine Learning
Hardware security
Attacks
Malware & vulnerabilities
Protocol security
Privacy (I)
CPS and IoT security
Mobile security
Database & web security
Cloud security
Applied crypto (I)
Privacy (II)
Multi-party computation
SDN security
Applied crypto (II).