|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-40576-1 |
003 |
DE-He213 |
005 |
20220602084710.0 |
007 |
cr nn 008mamaa |
008 |
130814s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642405761
|9 978-3-642-40576-1
|
024 |
7 |
|
|a 10.1007/978-3-642-40576-1
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security in Computing and Communications
|h [electronic resource] :
|b International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings /
|c edited by Sabu M Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XVI, 404 p. 149 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 377
|
505 |
0 |
|
|a A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature Embedding in the Functional Description of Reversible -- Circuit -- Detecting Laser Fault Injection for Smart Cards Using Security Automata -- Virtual World Authentication Using the Smart Card Web Server -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|0 (orcid)0000-0001-6453-5520
|1 https://orcid.org/0000-0001-6453-5520
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Atrey, Pradeep K.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Fan, Chun I.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Martinez Perez, Gregorio.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642405778
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642405754
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 377
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-40576-1
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|