LEADER 00970nam0 22003011 450 001 990008426620403321 005 20061127112533.0 035 $a000842662 035 $aFED01000842662 035 $a(Aleph)000842662FED01 035 $a000842662 100 $a20061127g19679999km-y0itay50------ba 101 0 $afre 105 $ay---n---001yy 200 1 $aObjectifs et principes fondamentaux d'un droit comparé de l'alimentation$f[Par] E.J. Bigwood et A. Gérard 210 $aBâle$aNew York$cS. Karger$d1967- 215 $av.$d24 cm 307 $a1: XII, 140 p. 327 0 $a1.: Introduction générale et domaine d'application 700 1$aBigwood,$bEdouard Jean$0310549 701 1$aGérard,$bAlain$0501742 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008426620403321 952 $aX M 182$b82291$fFGBC 959 $aFGBC 996 $aObjectifs et principes fondamentaux d'un droit comparé de l'alimentation$9727451 997 $aUNINA LEADER 04616nam 22006975 450 001 9910350215703321 005 20251225194932.0 010 $a981-15-0758-9 024 7 $a10.1007/978-981-15-0758-8 035 $a(CKB)5340000000061503 035 $a(MiAaPQ)EBC5967967 035 $a(DE-He213)978-981-15-0758-8 035 $a(PPN)248599739 035 $a(EXLCZ)995340000000061503 100 $a20191023d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Social Networks and Big Data $e5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /$fedited by Weizhi Meng, Steven Furnell 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (287 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1095 311 08$a981-15-0757-0 327 $aWeb Scanner Detection Based on Behavioral Differences -- DMU-ABSE: Dynamic Multi-User Attribute-based Searchable Encryption With File Deletion And User Revocation -- A Novel Lattice-based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Sharing -- Blockchain-based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network -- Development of an Early Warning System for Network Intrusion Detection using Benford?s Law Features -- An RTP Extension for Reliable User-data Transmission over VoIP Traffic -- A Hybrid Covert Channel with Feedback over Mobile Networks -- Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things -- Integer Version of Ring-LWE and its Applications -- Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart devices: A case study -- Retrieve the Hidden Leaves in the Forest: Prevent Voting Spamming in Zhihu -- Online Event Detection in Social Media with Bursty Event Recognition -- Predicting Users' Emotional Intelligence with Social Networking Data -- Design and Implementation of Medical Dispute Governance Based on Blockchain -- Greedily Remove k links to hide important individuals in social network -- Man-in-the-Middle Attacks on Electrical Power Grid SCADA System -- Blockchain-based Threshold Electronic Voting System -- PassGrid: Towards Graph-Supplemented Textual Shoulder Surfing Resistant Authentication -- Learning from Imbalanced Data: A Comparative Study. . 330 $aThis book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1095 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aApplication software 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aComputer and Information Systems Applications 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aApplication software. 615 14$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aComputer and Information Systems Applications. 676 $a302.30285 702 $aMeng$b Weizhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFurnell$b Steven$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910350215703321 996 $aSecurity and Privacy in Social Networks and Big Data$92551274 997 $aUNINA