000857502 000__ 03102cam\a2200565Ii\4500 000857502 001__ 857502 000857502 005__ 20230306145204.0 000857502 006__ m\\\\\o\\d\\\\\\\\ 000857502 007__ cr\cn\nnnunnun 000857502 008__ 181217s2018\\\\sz\a\\\\ob\\\\101\0\eng\d 000857502 019__ $$a1082294151 000857502 020__ $$a9783030051716$$q(electronic book) 000857502 020__ $$a3030051714$$q(electronic book) 000857502 020__ $$z9783030051709 000857502 0247_ $$a10.1007/978-3-030-05171-6$$2doi 000857502 035__ $$aSP(OCoLC)on1079058647 000857502 035__ $$aSP(OCoLC)1079058647$$z(OCoLC)1082294151 000857502 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dDKU$$dOCLCF$$dOCLCO 000857502 049__ $$aISEA 000857502 050_4 $$aQA76.9.A25 000857502 08204 $$a005.8$$223 000857502 1112_ $$aICISS (Conference)$$n(14th :$$d2018 :$$cBangalore, India) 000857502 24510 $$aInformation systems security :$$b14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /$$cVinod Ganapathy, Trent Jaeger, R.K. Shyamasundar (eds.). 000857502 2463_ $$aICISS 2018 000857502 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000857502 300__ $$a1 online resource (xix, 481 pages) :$$billustrations. 000857502 336__ $$atext$$btxt$$2rdacontent 000857502 337__ $$acomputer$$bc$$2rdamedia 000857502 338__ $$aonline resource$$bcr$$2rdacarrier 000857502 347__ $$atext file$$bPDF$$2rda 000857502 4901_ $$aLecture notes in computer science ;$$v11281 000857502 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000857502 500__ $$aInternational conference proceedings. 000857502 504__ $$aIncludes bibliographical references and author index. 000857502 5050_ $$aSecurity for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication. 000857502 506__ $$aAccess limited to authorized users. 000857502 520__ $$aThis book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication. 000857502 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 17, 2018). 000857502 650_0 $$aComputer security$$vCongresses. 000857502 650_0 $$aComputer networks$$xAccess control$$vCongresses. 000857502 7001_ $$aGanapathy, Vinod,$$eeditor. 000857502 7001_ $$aJaeger, Trent,$$eeditor. 000857502 7001_ $$aShyamasundar, R. K.,$$eeditor. 000857502 77608 $$iPrint version: $$z9783030051709 000857502 830_0 $$aLecture notes in computer science ;$$v11281. 000857502 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000857502 852__ $$bebk 000857502 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-05171-6$$zOnline Access$$91397441.1 000857502 909CO $$ooai:library.usi.edu:857502$$pGLOBAL_SET 000857502 980__ $$aEBOOK 000857502 980__ $$aBIB 000857502 982__ $$aEbook 000857502 983__ $$aOnline 000857502 994__ $$a92$$bISE