|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-34135-9 |
003 |
DE-He213 |
005 |
20220117032905.0 |
007 |
cr nn 008mamaa |
008 |
120910s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642341359
|9 978-3-642-34135-9
|
024 |
7 |
|
|a 10.1007/978-3-642-34135-9
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Recent Trends in Computer Networks and Distributed Systems Security
|h [electronic resource] :
|b International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proceedings /
|c edited by Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz-Calero, Tony Thomas.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XXI, 508 p. 207 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 335
|
505 |
0 |
|
|a a novel key management mechanism for dynamic hierarchical access control based on linear polynomials -- performance evaluation of the fuzzy ARTMAP for network intrusion detection -- ID-based threshold signcryption and group unsigncryption -- protocol for secure submissions into learning management systems.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zomaya, Albert Y.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Strufe, Thorsten.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Alcaraz-Calero, Jose M.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Thomas, Tony.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642341366
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642341342
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 335
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-34135-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|