LEADER 01205nam--2200409---450- 001 990001879080203316 005 20051103135135.0 035 $a000187908 035 $aUSA01000187908 035 $a(ALEPH)000187908USA01 035 $a000187908 100 $a20040727d1969----km-y0itay0103----ba 101 0 $ager 102 $aDE 105 $a||||||||001yy 200 1 $aKleine Schriften$fvon Erwin Rohde 205 $aRist. anast. 210 $aHildesheim ; New York$cOlms$d1969 215 $a2 v. (XXXI, 436 p.) (481 p.)$d22 cm 300 $aRipr. facs. dell'ed.: Tubingen und Leipzig, 1901 410 0$12001 454 1$12001 461 1$1001-------$12001 676 $a880.09 700 1$aROHDE,$bErwin$0391094 801 0$aIT$bsalbc$gISBD 912 $a990001879080203316 951 $aV.1.B. 475/1(VIII C 1045/1)$b51851 L.M.$cVIII C 951 $aV.1.B. 475/2(VIII C 1045/2)$b51852 L.M.$cVIII C 959 $aBK 969 $aUMA 979 $aSIAV4$b10$c20040727$lUSA01$h1450 979 $aSIAV4$b10$c20040727$lUSA01$h1454 979 $aSIAV4$b10$c20040727$lUSA01$h1532 979 $aCOPAT3$b90$c20051103$lUSA01$h1351 996 $aKleine Schriften$9538092 997 $aUNISA LEADER 04124nam 22006015 450 001 9910299197503321 005 20251226195625.0 010 $a3-319-23802-7 024 7 $a10.1007/978-3-319-23802-9 035 $a(CKB)3710000000541767 035 $a(SSID)ssj0001597042 035 $a(PQKBManifestationID)16297495 035 $a(PQKBTitleCode)TC0001597042 035 $a(PQKBWorkID)14886099 035 $a(PQKB)10189413 035 $a(DE-He213)978-3-319-23802-9 035 $a(MiAaPQ)EBC6287628 035 $a(MiAaPQ)EBC5577740 035 $a(Au-PeEL)EBL5577740 035 $a(OCoLC)933784231 035 $a(PPN)190886528 035 $a(EXLCZ)993710000000541767 100 $a20151201d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInternational Conference on Security and Privacy in Communication Networks $e10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II /$fedited by Jin Tian, Jiwu Jing, Mudhakar Srivatsa 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XIX, 409 p. 126 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v153 300 $aIncludes index. 311 08$a3-319-23801-9 327 $aSecurity and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks -- network intrusion detection and prevention, firewalls, packet filters -- malware, and distributed denial of service -- communication privacy and anonymity -- network and internet forensics techniques -- public key infrastructures, key management, credential management -- secure routing, naming/addressing, network management -- security and privacy in pervasive and ubiquitous computing -- security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems -- security & isolation in data center networks -- security & isolation in software defined networking. 330 $aThis 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v153 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aTian$b Jin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJing$b Jiwu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSrivatsa$b Mudhakar$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299197503321 996 $aInternational Conference on Security and Privacy in Communication Networks$92535392 997 $aUNINA