Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings / [electronic resource] :
edited by Li Xu, Elisa Bertino, Yi Mu.
- 1st ed. 2012.
- XIV, 532 p. 133 illus. online resource.
- Security and Cryptology, 7645 2946-1863 ; .
- Security and Cryptology, 7645 .
network security -- system security -- public key cryptography -- privacy -- authentication -- security analysis.- access control.
This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.
9783642346019
10.1007/978-3-642-34601-9 doi
Data protection.
Computer networks .
Cryptography.
Data encryption (Computer science).
Database management.
Electronic data processing--Management.
Electronic commerce.
Data and Information Security.
Computer Communication Networks.
Cryptology.
Database Management.
IT Operations.
e-Commerce and e-Business.
QA76.9.A25
005.8
network security -- system security -- public key cryptography -- privacy -- authentication -- security analysis.- access control.
This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.
9783642346019
10.1007/978-3-642-34601-9 doi
Data protection.
Computer networks .
Cryptography.
Data encryption (Computer science).
Database management.
Electronic data processing--Management.
Electronic commerce.
Data and Information Security.
Computer Communication Networks.
Cryptology.
Database Management.
IT Operations.
e-Commerce and e-Business.
QA76.9.A25
005.8