000 03802nam a22006615i 4500
001 978-3-319-72598-7
003 DE-He213
005 20210120143331.0
007 cr nn 008mamaa
008 171201s2017 gw | s |||| 0|eng d
020 _a9783319725987
_9978-3-319-72598-7
024 7 _a10.1007/978-3-319-72598-7
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Systems Security
_h[electronic resource] :
_b13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings /
_cedited by Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXI, 415 p. 112 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology ;
_v10717
_aLecture Notes in Computer Science
_v10717
505 0 _aPrivacy/cryptography -- Systems security -- Security analysis -- Identity management and access control -- Security attacks and detection -- Network security.
520 _aThis book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics: privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aComputers and civilization.
650 0 _aComputer communication systems.
650 0 _aComputers.
650 0 _aLaw and legislation.
650 0 _aApplication software.
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
650 2 4 _aData Structures and Information Theory.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I15009
650 2 4 _aComputers and Society.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24040
650 2 4 _aComputer Communication Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I13022
650 2 4 _aLegal Aspects of Computing.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I24059
650 2 4 _aInformation Systems Applications (incl. Internet).
_0https://scigraph.springernature.com/ontologies/product-market-codes/I18040
700 1 _aShyamasundar, Rudrapatna K.
_eeditor.
_0(orcid)0000-0001-6966-0507
_1https://orcid.org/0000-0001-6966-0507
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aSingh, Virendra.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aVaidya, Jaideep.
_eeditor.
_0(orcid)0000-0002-7420-6947
_1https://orcid.org/0000-0002-7420-6947
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319725970
776 0 8 _iPrinted edition:
_z9783319725994
830 0 _aSecurity and Cryptology ;
_v10717
830 0 _aLecture Notes in Computer Science ;
_v10717
856 4 0 _uhttps://doi.org/10.1007/978-3-319-72598-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cEBK
999 _c57539
_d57539