LEADER 04016nam 22008775 450 001 996466571003316 005 20200702004350.0 010 $a3-642-34601-4 024 7 $a10.1007/978-3-642-34601-9 035 $a(CKB)3400000000102829 035 $a(SSID)ssj0000810214 035 $a(PQKBManifestationID)11446161 035 $a(PQKBTitleCode)TC0000810214 035 $a(PQKBWorkID)10833144 035 $a(PQKB)11121840 035 $a(DE-He213)978-3-642-34601-9 035 $a(MiAaPQ)EBC6282993 035 $a(MiAaPQ)EBC5576651 035 $a(Au-PeEL)EBL5576651 035 $a(OCoLC)1066186318 035 $a(PPN)168327236 035 $a(EXLCZ)993400000000102829 100 $a20121116d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aNetwork and System Security$b[electronic resource] $e6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings /$fedited by Li Xu, Elisa Bertino, Yi Mu 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIV, 532 p. 133 illus.) 225 1 $aSecurity and Cryptology ;$v7645 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-34600-6 320 $aIncludes bibliographical references and index. 327 $anetwork security -- system security -- public key cryptography -- privacy -- authentication -- security analysis.- access control. 330 $aThis book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control. 410 0$aSecurity and Cryptology ;$v7645 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aDatabase management 606 $aManagement information systems 606 $aComputer science 606 $aE-commerce 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aDatabase management. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aE-commerce. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aDatabase Management. 615 24$aManagement of Computing and Information Systems. 615 24$ae-Commerce/e-business. 676 $a005.8 702 $aXu$b Li$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBertino$b Elisa$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466571003316 996 $aNetwork and system security$92088039 997 $aUNISA