LEADER 03389nam 22007575 450 001 9910483849803321 005 20251113184922.0 010 $a3-319-17040-6 024 7 $a10.1007/978-3-319-17040-4 035 $a(CKB)3710000000404056 035 $a(SSID)ssj0001501479 035 $a(PQKBManifestationID)11771924 035 $a(PQKBTitleCode)TC0001501479 035 $a(PQKBWorkID)11447064 035 $a(PQKB)10656812 035 $a(DE-He213)978-3-319-17040-4 035 $a(MiAaPQ)EBC6295411 035 $a(MiAaPQ)EBC5596070 035 $a(Au-PeEL)EBL5596070 035 $a(OCoLC)906938143 035 $a(PPN)185488986 035 $a(EXLCZ)993710000000404056 100 $a20150404d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFoundations and Practice of Security $e7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers /$fedited by Frédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood, Philip W. L. Fong 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIII, 375 p. 98 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8930 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-17039-2 327 $aPrivacy -- Software security and malware analysis -- Network security and protocols -- Access control models and policy analysis -- Protocol verification -- Cryptographic technologies. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8930 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aData and Information Security 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aCoding and Information Theory. 676 $a005.82 702 $aCuppens$b Frédéric$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZincir Heywood$b Nur$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFong$b Philip W. L$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483849803321 996 $aFoundations and Practice of Security$94159644 997 $aUNINA