Communications and Multimedia Security [electronic resource] : 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings / edited by Bart De Decker, André Zúquete.
Contributor(s): De Decker, Bart [editor.] | Zúquete, André [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 8735Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014Edition: 1st ed. 2014.Description: XII, 157 p. 37 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783662448854.Subject(s): Data protection | Biometric identification | Computer networks | Electronic commerce | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Data and Information Security | Biometrics | Computer Communication Networks | e-Commerce and e-Business | Cryptology | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.No physical items for this record
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
There are no comments for this item.