Innovative Security Solutions for Information Technology and Communications (Record no. 88824)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05763nam a22006615i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-030-12942-2 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730173236.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190205s2019 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783030129422 |
-- | 978-3-030-12942-2 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-030-12942-2 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Innovative Security Solutions for Information Technology and Communications |
Medium | [electronic resource] : |
Remainder of title | 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers / |
Statement of responsibility, etc. | edited by Jean-Louis Lanet, Cristian Toma. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer International Publishing : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIII, 530 p. 248 illus., 91 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 11359 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Ultralightweight Cryptography - Some thoughts on ten years of efforts -- Android Malware Analysis: from technical difficulties to scientific challenges -- Post-Quantum Cryptography and a (Qu)Bit More -- Normalization of Java source codes -- HiddenApp - Securing Linux applications using ARM TrustZone -- Security Knowledge Management in Open Source Software Communities -- Formal Security Analysis of Cloud-connected Industrial Control Systems -- A Hybrid Searchable Encryption Scheme for Cloud Computing -- Securing Cloud Storage by Transparent Biometric Cryptography -- Examining the Use of Neural Networks for Intrusion Detection in Controller Area Networks -- An Evaluation of OCR Systems against Adversarial Machine Learning -- Intrusion detection and classification with autoencoded deep neural network -- Detecting Malicious Windows Commands Using Natural Language Processing Techniques -- Evolutionary Computation Algorithms for Detecting Known and Unknown Attacks -- Assuring Privacy in Surfing the Internet -- Roaming Interface Signaling Security for LTE Networks -- Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile -- Anomaly-based Network Intrusion Detection using Wavelets and Adversarial Autoencoders -- Analysis and Evaluation of Dynamic Feature-based Malware Detection Methods -- Trends in design of ransomware viruses -- Efficient Implementation of the SHA-512 Hash Function for 8-bit AVR Microcontrollers -- Secure IoT Supply Chain Management Solution using Blockchain and Smart Contracts Technology -- ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT using Blockchain Technology -- Development of the unified security requirements of PUFs during the standardization process -- A PUF-based Destructive-private Mutual Authentication RFID Protocol -- Weakened Random Oracle Models with Target Prefix -- An Improved Algorithm for Iterative Matrix-Vector Multiplications over Finite Fields -- On the security of Jhanwar-Barua Identity-Based EncryptionScheme -- Vulnerabilities of the McEliece variants based on Polar codes -- Binary Data Analysis for Source Code Leakage Assessment -- Zero in and TimeFuzz: Detection and Mitigation of Cache Side-Channel Attacks -- A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib -- A New DNA-Combining Chaos Scheme for Fast and Secure Image Encryption -- Implementing Searchable Encryption schemes over Multilinear Maps -- A Unified Security Perspective on Legally Fair Contract Signing Protocols -- Relating different Polynomial-LWE problems -- Monoidal encryption over (F2, ·) -- Geometric pairwise key-sharing scheme. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018. The 35 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 70 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers |
General subdivision | Law and legislation. |
9 (RLIN) | 75151 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Information technology |
General subdivision | Law and legislation. |
9 (RLIN) | 82531 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Software engineering. |
9 (RLIN) | 4138 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Application software. |
9 (RLIN) | 107568 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Artificial intelligence. |
9 (RLIN) | 3407 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 107569 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Legal Aspects of Computing. |
9 (RLIN) | 53952 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Software Engineering. |
9 (RLIN) | 4138 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer and Information Systems Applications. |
9 (RLIN) | 107570 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Artificial Intelligence. |
9 (RLIN) | 3407 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lanet, Jean-Louis. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 107571 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Toma, Cristian. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 107572 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 107573 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783030129415 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783030129439 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Security and Cryptology, |
International Standard Serial Number | 2946-1863 ; |
Volume/sequential designation | 11359 |
9 (RLIN) | 107574 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.