LEADER 03508nam 22007335 450 001 9910254987503321 005 20251226203045.0 010 $a981-10-2738-2 024 7 $a10.1007/978-981-10-2738-3 035 $a(CKB)3710000000873038 035 $a(DE-He213)978-981-10-2738-3 035 $a(MiAaPQ)EBC6302794 035 $a(MiAaPQ)EBC5596404 035 $a(Au-PeEL)EBL5596404 035 $a(OCoLC)958930548 035 $a(PPN)195511891 035 $a(EXLCZ)993710000000873038 100 $a20160916d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity in Computing and Communications $e4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /$fedited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero 205 $a1st ed. 2016. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2016. 215 $a1 online resource (XXII, 474 p. 179 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v625 311 08$a981-10-2737-4 327 $aCryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. . 330 $aThis book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v625 606 $aData protection 606 $aArtificial intelligence$xData processing 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData and Information Security 606 $aData Science 606 $aCryptology 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aArtificial intelligence$xData processing. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aData Science. 615 24$aCryptology. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aMueller$b Peter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThampi$b Sabu M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlam Bhuiyan$b Md Zakirul$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKo$b Ryan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDoss$b Robin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlcaraz Calero$b Jose M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254987503321 996 $aSecurity in Computing and Communications$92256445 997 $aUNINA