LEADER 04243nam 22008175 450 001 9910484446003321 005 20200704215629.0 010 $a3-319-64701-6 024 7 $a10.1007/978-3-319-64701-2 035 $a(CKB)4340000000061664 035 $a(DE-He213)978-3-319-64701-2 035 $a(MiAaPQ)EBC6285514 035 $a(MiAaPQ)EBC5592058 035 $a(Au-PeEL)EBL5592058 035 $a(OCoLC)1066191541 035 $a(PPN)203850092 035 $a(EXLCZ)994340000000061664 100 $a20170725d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security$b[electronic resource] $e11th International Conference, NSS 2017, Helsinki, Finland, August 21?23, 2017, Proceedings /$fedited by Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVIII, 762 p. 214 illus.) 225 1 $aSecurity and Cryptology ;$v10394 300 $aIncludes index. 311 $a3-319-64700-8 327 $aCloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . 330 $aThis book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT Security; Network Security; Platform and Hardware Security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017); Security in Big Data (SECBD-2017); 5G Security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017). 410 0$aSecurity and Cryptology ;$v10394 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aSoftware engineering 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aSoftware engineering. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aSoftware Engineering. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aYan$b Zheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMolva$b Refik$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMazurczyk$b Wojciech$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKantola$b Raimo$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484446003321 996 $aNetwork and system security$92088039 997 $aUNINA