LEADER 04281nam 22008415 450 001 9910739401503321 005 20200703223017.0 010 $a3-642-36883-2 024 7 $a10.1007/978-3-642-36883-7 035 $a(CKB)3280000000007724 035 $a(DE-He213)978-3-642-36883-7 035 $a(SSID)ssj0000879688 035 $a(PQKBManifestationID)11532235 035 $a(PQKBTitleCode)TC0000879688 035 $a(PQKBWorkID)10869963 035 $a(PQKB)11758510 035 $a(MiAaPQ)EBC3101084 035 $a(PPN)168330504 035 $a(EXLCZ)993280000000007724 100 $a20130217d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $e8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers /$fedited by Angelos D. Keromytis, Roberto Di Pietro 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (X, 369 p. 111 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v106 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-36882-4 320 $aIncludes bibliographical references and author index. 327 $aCrypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy. 330 $aThis volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-8211 ;$v106 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 608 $aConference proceedings.$2fast 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 676 $a621.382/1 702 $aKeromytis$b Angelos D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDi Pietro$b Roberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739401503321 996 $aSecurity and Privacy in Communication Networks$93012314 997 $aUNINA