LEADER 03936nam 22007575 450 001 996465473703316 005 20200705044139.0 010 $a3-319-49148-2 024 7 $a10.1007/978-3-319-49148-6 035 $a(CKB)3710000000981107 035 $a(DE-He213)978-3-319-49148-6 035 $a(MiAaPQ)EBC6300776 035 $a(MiAaPQ)EBC5576781 035 $a(Au-PeEL)EBL5576781 035 $a(OCoLC)963936261 035 $a(PPN)197137121 035 $a(EXLCZ)993710000000981107 100 $a20161109d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage$b[electronic resource] $e9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings /$fedited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XVI, 508 p. 149 illus.) 225 1 $aSecurity and Cryptology ;$v10066 311 $a3-319-49147-4 327 $aSecurity Algorithms and Architectures -- Policies -- Regulations and Techniques -- Anonymous Computation and Communication -- Security -- Privacy -- Anonymity. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016. The 40 papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. 410 0$aSecurity and Cryptology ;$v10066 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aComputer communication systems 606 $aPrivacy$3https://scigraph.springernature.com/ontologies/product-market-codes/I28010 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 14$aPrivacy. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRay$b Indrakshi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAlcaraz Calero$b Jose M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThampi$b Sabu M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465473703316 996 $aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage$92295526 997 $aUNISA