Information Systems Security [electronic resource] : 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings / edited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar.
Contributor(s): Ganapathy, Vinod [editor.]
| Jaeger, Trent [editor.]
| Shyamasundar, R.K [editor.]
| SpringerLink (Online service)
.
Material type: 












Security for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
There are no comments for this item.