LEADER 04265nam 22008415 450 001 996465876803316 005 20230525175929.0 010 $a3-642-24712-1 024 7 $a10.1007/978-3-642-24712-5 035 $a(CKB)2550000000054503 035 $a(SSID)ssj0000609357 035 $a(PQKBManifestationID)11373741 035 $a(PQKBTitleCode)TC0000609357 035 $a(PQKBWorkID)10619282 035 $a(PQKB)10482312 035 $a(DE-He213)978-3-642-24712-5 035 $a(MiAaPQ)EBC3067351 035 $a(PPN)156309513 035 $a(EXLCZ)992550000000054503 100 $a20110924d2011 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCommunications and Multimedia Security$b[electronic resource] $e12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings /$fedited by Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIV, 257 p.) 225 1 $aSecurity and Cryptology ;$v7025 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-24711-3 320 $aIncludes bibliographical references and index. 327 $apt. 1. Research papers -- pt. 2. Work in progress -- pt. 3. Posters -- pt. 4. Keynotes. 330 $aThis book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2011, held in Ghent, Belgium, in October 2011. The 26 revised  papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management,  secure hardware platforms, biometrics, multimedia security, network security and authentication. 410 0$aSecurity and Cryptology ;$v7025 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputers and civilization 606 $aOperating systems (Computers) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aOperating systems (Computers). 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aOperating Systems. 676 $a005.8 702 $aDecker$b Bart de$f1958-$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLapon$b Jorn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNaessens$b Vincent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aUhl$b Andreas$f1968-.$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aInternational Federation for Information Processing. 712 12$aIFIP TC6/TC11 International Conference on Communications and Multimedia Security 906 $aBOOK 912 $a996465876803316 996 $aCommunications and Multimedia Security$9772291 997 $aUNISA