000 | 03462nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-319-25645-0 | ||
003 | DE-He213 | ||
005 | 20240730194659.0 | ||
007 | cr nn 008mamaa | ||
008 | 151123s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319256450 _9978-3-319-25645-0 |
||
024 | 7 |
_a10.1007/978-3-319-25645-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aNetwork and System Security _h[electronic resource] : _b9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings / _cedited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXIV, 542 p. 126 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9408 |
|
505 | 0 | _aWireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications and network security. | |
520 | _aThis book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security. . | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9157738 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9157739 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aQiu, Meikang. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157740 |
|
700 | 1 |
_aXu, Shouhuai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157741 |
|
700 | 1 |
_aYung, Moti. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157742 |
|
700 | 1 |
_aZhang, Haibo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157743 |
|
710 | 2 |
_aSpringerLink (Online service) _9157744 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319256443 |
776 | 0 | 8 |
_iPrinted edition: _z9783319256467 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9408 _9157745 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-25645-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95289 _d95289 |