Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II / [electronic resource] :
edited by Miroslaw Kutylowski, Jaideep Vaidya.
- 1st ed. 2014.
- XVI, 516 p. 106 illus. online resource.
- Security and Cryptology, 8713 2946-1863 ; .
- Security and Cryptology, 8713 .
Cryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy.
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.
9783319112121
10.1007/978-3-319-11212-1 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Data and Information Security.
Cryptology.
IT Operations.
QA76.9.A25
005.8
Cryptography, formal methods and theory of security -- Security services -- Intrusion/anomaly detection and malware mitigation -- Security in hardware -- Systems security -- Network security -- Database and storage security -- Software and application security -- Human and societal aspects of security and privacy.
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.
9783319112121
10.1007/978-3-319-11212-1 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Data and Information Security.
Cryptology.
IT Operations.
QA76.9.A25
005.8