Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II

Author:   Javier Lopez ,  Jianying Zhou ,  Miguel Soriano
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   11099
ISBN:  

9783319989884


Pages:   571
Publication Date:   08 August 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II


Add your own review!

Overview

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 

Full Product Details

Author:   Javier Lopez ,  Jianying Zhou ,  Miguel Soriano
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2018
Volume:   11099
Weight:   0.896kg
ISBN:  

9783319989884


ISBN 10:   331998988
Pages:   571
Publication Date:   08 August 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Software security.- Blockchain & machine Learning.- Hardware security.- Attacks.- Malware & vulnerabilities.- Protocol security.- Privacy (I).- CPS and IoT security.- Mobile security.- Database & web security.- Cloud security.- Applied crypto (I).- Privacy (II).- Multi-party computation.- SDN security.- Applied crypto (II).

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List