|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465283103316 |
|
|
Titolo |
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems [[electronic resource] ] : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012, Proceedings / / edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2012.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 225 p. 42 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 7322 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer communication systems |
Management information systems |
Computer science |
Data encryption (Computer science) |
Data structures (Computer science) |
Computer security |
Computers and civilization |
Computer Communication Networks |
Management of Computing and Information Systems |
Cryptology |
Data Structures and Information Theory |
Systems and Data Security |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
International conference proceedings. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and author index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with |
|
|
|
|
|
|
|
|
|
|
three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security. |
|
|
|
|
|
| |