|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465407503316 |
|
|
Titolo |
Communications and Multimedia Security [[electronic resource] ] : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / / edited by Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 249 p. 83 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 8099 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Biometrics (Biology) |
Computer communication systems |
E-commerce |
Data encryption (Computer science) |
Management information systems |
Computer science |
Systems and Data Security |
Biometrics |
Computer Communication Networks |
e-Commerce/e-business |
Cryptology |
Management of Computing and Information Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
Biometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 |
|
|
|
|
|
|
|
|
|
|
extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication. |
|
|
|
|
|
| |