|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-981-10-2738-3 |
003 |
DE-He213 |
005 |
20220427080743.0 |
007 |
cr nn 008mamaa |
008 |
160916s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811027383
|9 978-981-10-2738-3
|
024 |
7 |
|
|a 10.1007/978-981-10-2738-3
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security in Computing and Communications
|h [electronic resource] :
|b 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
|c edited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Singapore :
|b Springer Nature Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XXII, 474 p. 179 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 625
|
505 |
0 |
|
|a Cryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. .
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Artificial intelligence-Data processing.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Data Science.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Mueller, Peter.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Alam Bhuiyan, Md Zakirul.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ko, Ryan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Doss, Robin.
|e editor.
|0 (orcid)0000-0001-6143-6850
|1 https://orcid.org/0000-0001-6143-6850
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Alcaraz Calero, Jose M.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811027376
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811027390
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 625
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-981-10-2738-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|