|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-28865-9 |
003 |
DE-He213 |
005 |
20230418184634.0 |
007 |
cr nn 008mamaa |
008 |
160330s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319288659
|9 978-3-319-28865-9
|
024 |
7 |
|
|a 10.1007/978-3-319-28865-9
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Privacy in Communication Networks
|h [electronic resource] :
|b 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers /
|c edited by Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIII, 741 p. 240 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-822X ;
|v 164
|
520 |
|
|
|a This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015. The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
700 |
1 |
|
|a Thuraisingham, Bhavani.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, XiaoFeng.
|e editor.
|0 (orcid)0000-0002-0607-4946
|1 https://orcid.org/0000-0002-0607-4946
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yegneswaran, Vinod.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319288642
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319288666
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-822X ;
|v 164
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-28865-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|