000 | 02962nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-22348-8 | ||
003 | DE-He213 | ||
005 | 20240730202140.0 | ||
007 | cr nn 008mamaa | ||
008 | 110628s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642223488 _9978-3-642-22348-8 |
||
024 | 7 |
_a10.1007/978-3-642-22348-8 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aData and Applications Security and Privacy XXV _h[electronic resource] : _b25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings / _cedited by Yingjiu Li. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aXI, 309 p. 90 illus., 32 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v6818 |
|
520 | _aThis book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9170139 |
|
650 | 0 |
_aApplication software. _9170140 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9170141 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9170142 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aLi, Yingjiu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9170143 |
|
710 | 2 |
_aSpringerLink (Online service) _9170144 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642223471 |
776 | 0 | 8 |
_iPrinted edition: _z9783642223495 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v6818 _9170145 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-22348-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96874 _d96874 |