LEADER 04112nam 22006735 450 001 9910299267103321 005 20200704051233.0 010 $a3-319-78816-7 024 7 $a10.1007/978-3-319-78816-6 035 $a(CKB)4100000003359614 035 $a(DE-He213)978-3-319-78816-6 035 $a(MiAaPQ)EBC6284724 035 $a(PPN)226697207 035 $a(EXLCZ)994100000003359614 100 $a20180424d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $eSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22?25, 2017, Proceedings /$fedited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XI, 339 p. 104 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v239 300 $aIncludes index. 311 $a3-319-78815-9 327 $aAccess control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. 330 $aThis book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v239 606 $aComputer security 606 $aData protection 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aData protection. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aSecurity. 615 24$aCryptology. 615 24$aComputer Communication Networks. 676 $a621.3821 702 $aLin$b Xiaodong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGhorbani$b Ali$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRen$b Kui$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhu$b Sencun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Aiqing$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299267103321 996 $aSecurity and Privacy in Communication Networks$93012314 997 $aUNINA