LEADER 03668nam 22006735 450 001 9910437566903321 005 20200629145656.0 010 $a3-642-40576-2 024 7 $a10.1007/978-3-642-40576-1 035 $a(CKB)3710000000015933 035 $a(SSID)ssj0000986838 035 $a(PQKBManifestationID)11552504 035 $a(PQKBTitleCode)TC0000986838 035 $a(PQKBWorkID)10941690 035 $a(PQKB)10738142 035 $a(DE-He213)978-3-642-40576-1 035 $a(MiAaPQ)EBC3096986 035 $a(PPN)172429684 035 $a(EXLCZ)993710000000015933 100 $a20130814d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in Computing and Communications $eInternational Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings /$fedited by Sabu M Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XVI, 404 p. 149 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v377 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-40575-4 327 $aA Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature Embedding in the Functional Description of Reversible -- Circuit -- Detecting Laser Fault Injection for Smart Cards Using Security Automata -- Virtual World Authentication Using the Smart Card Web Server -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. 330 $aThis book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v377 606 $aComputer security 606 $aComputer communication systems 606 $aE-commerce 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aE-commerce. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$ae-Commerce/e-business. 676 $a005.8 702 $aThampi$b Sabu M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAtrey$b Pradeep K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFan$b Chun I$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMartinez Perez$b Gregorio$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910437566903321 996 $aSecurity in Computing and Communications$92256445 997 $aUNINA