|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910484797103321 |
|
|
Titolo |
Network and System Security : 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings / / edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2015.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 542 p. 126 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 9408 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer communication systems |
Data encryption (Computer science) |
Management information systems |
Computer science |
Computers and civilization |
Systems and Data Security |
Computer Communication Networks |
Cryptology |
Management of Computing and Information Systems |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Wireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications and network security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless |
|
|
|
|
|
|
|
|
|
|
security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security. . |
|
|
|
|
|
| |