|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-25645-0 |
003 |
DE-He213 |
005 |
20220115044252.0 |
007 |
cr nn 008mamaa |
008 |
151123s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319256450
|9 978-3-319-25645-0
|
024 |
7 |
|
|a 10.1007/978-3-319-25645-0
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Network and System Security
|h [electronic resource] :
|b 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings /
|c edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIV, 542 p. 126 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9408
|
505 |
0 |
|
|a Wireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications and network security.
|
520 |
|
|
|a This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Qiu, Meikang.
|e editor.
|0 (orcid)0000-0002-1004-0140
|1 https://orcid.org/0000-0002-1004-0140
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Xu, Shouhuai.
|e editor.
|0 (orcid)0000-0001-8034-0942
|1 https://orcid.org/0000-0001-8034-0942
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yung, Moti.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhang, Haibo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319256443
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319256467
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9408
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-25645-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|