000845924 000__ 02979cam\a2200541Mi\4500 000845924 001__ 845924 000845924 005__ 20230306144948.0 000845924 006__ m\\\\\o\\d\\\\\\\\ 000845924 007__ cr\nn\nnnunnun 000845924 008__ 180810s2018\\\\gw\\\\\\o\\\\\000\0\eng\d 000845924 019__ $$a1048596505$$a1050614584$$a1054353738 000845924 020__ $$a9783319990736 000845924 020__ $$a331999073X 000845924 020__ $$z9783319990729 000845924 0247_ $$a10.1007/978-3-319-99073-6$$2doi 000845924 035__ $$aSP(OCoLC)on1049851888 000845924 035__ $$aSP(OCoLC)1049851888$$z(OCoLC)1048596505$$z(OCoLC)1050614584$$z(OCoLC)1054353738 000845924 040__ $$aUCW$$beng$$cUCW$$dOCLCO$$dGW5XE$$dYDX$$dUAB 000845924 049__ $$aISEA 000845924 050_4 $$aQA76.9.A25 000845924 08204 $$a005.8$$223 000845924 24500 $$aComputer Security :$$b23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I /$$cedited by Javier Lopez, Jianying Zhou, Miguel Soriano. 000845924 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2018. 000845924 300__ $$a1 online resource (xix, 621 pages) :$$billustrations. 000845924 336__ $$atext$$btxt$$2rdacontent 000845924 337__ $$acomputer$$bc$$2rdamedia 000845924 338__ $$aonline resource$$bcr$$2rdacarrier 000845924 347__ $$atext file$$bPDF$$2rda 000845924 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v11098 000845924 5050_ $$aSoftware security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II). 000845924 506__ $$aAccess limited to authorized users. 000845924 520__ $$aThe two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. . 000845924 650_0 $$aComputer science. 000845924 650_0 $$aComputer organization. 000845924 650_0 $$aComputer security. 000845924 650_0 $$aData encryption (Computer science) 000845924 650_0 $$aComputers. 000845924 650_0 $$aComputers and civilization. 000845924 650_0 $$aLaw and legislation. 000845924 7001_ $$aLopez, Javier.$$eeditor. 000845924 7001_ $$aZhou, Jianying.$$eeditor. 000845924 7001_ $$aSoriano, Miguel.$$eeditor. 000845924 77608 $$iPrint version:$$z9783319990729 000845924 830_0 $$aLecture notes in computer science ;$$v11098. 000845924 85280 $$bebk$$hSpringerLink 000845924 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-99073-6$$zOnline Access$$91397441.1 000845924 909CO $$ooai:library.usi.edu:845924$$pGLOBAL_SET 000845924 980__ $$aEBOOK 000845924 980__ $$aBIB 000845924 982__ $$aEbook 000845924 983__ $$aOnline 000845924 994__ $$a92$$bISE