LEADER 03605nam 22007575 450 001 9910483416903321 005 20251226195127.0 010 $a3-319-45931-7 024 7 $a10.1007/978-3-319-45931-8 035 $a(CKB)3710000000872922 035 $a(DE-He213)978-3-319-45931-8 035 $a(MiAaPQ)EBC6296738 035 $a(MiAaPQ)EBC5576905 035 $a(Au-PeEL)EBL5576905 035 $a(OCoLC)958963356 035 $a(PPN)195510917 035 $a(EXLCZ)993710000000872922 100 $a20160916d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26?27, 2016, Proceedings /$fedited by Sara Foresti, Javier Lopez 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 271 p. 59 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9895 311 08$a3-319-45930-9 327 $aAuthentication and key management -- Secure hardware systems -- Attacks to software and network systems -- Access control and data protection. 330 $aThis volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9895 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer engineering 606 $aComputer networks 606 $aApplication software 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aCryptology 606 $aComputer Engineering and Networks 606 $aComputer and Information Systems Applications 606 $aIT Operations 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputer Engineering and Networks. 615 24$aComputer and Information Systems Applications. 615 24$aIT Operations. 676 $a005.8 702 $aForesti$b Sara$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLo?pez$b Javier$g(Javier Lo?pez-Mun?oz),$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483416903321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA