Information and Communications Security Information and Communications Security

Information and Communications Security

20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings

David Naccache and Others
    • $84.99
    • $84.99

Publisher Description

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.
The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

GENRE
Computers & Internet
RELEASED
2018
October 26
LANGUAGE
EN
English
LENGTH
833
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
53.2
MB

More Books Like This

Cryptology and Network Security Cryptology and Network Security
2016
Information Security Practice and Experience Information Security Practice and Experience
2018
Information Security and Privacy Information Security and Privacy
2017
Trusted Systems Trusted Systems
2016
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020
Information Security and Cryptology Information Security and Cryptology
2020

More Books by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang & Ahmed Meddahi

The New Codebreakers The New Codebreakers
2016
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
2016
Cryptology and Network Security Cryptology and Network Security
2015
Towards Hardware-Intrinsic Security Towards Hardware-Intrinsic Security
2010