Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I

Author:   Javier Lopez ,  Jianying Zhou ,  Miguel Soriano
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   11098
ISBN:  

9783319990729


Pages:   621
Publication Date:   12 August 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I


Add your own review!

Overview

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 

Full Product Details

Author:   Javier Lopez ,  Jianying Zhou ,  Miguel Soriano
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   11098
Weight:   9.591kg
ISBN:  

9783319990729


ISBN 10:   3319990721
Pages:   621
Publication Date:   12 August 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Software security.- Blockchain & machine Learning.- Hardware security.- Attacks.- Malware & vulnerabilities.- Protocol security.- Privacy (I).- CPS and IoT security.- Mobile security.- Database & web security.- Cloud security.- Applied crypto (I).- Privacy (II).- Multi-party computation.- SDN security.- Applied crypto (II).

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List