top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Engineering Secure Future Internet Services and Systems [[electronic resource] ] : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli
Engineering Secure Future Internet Services and Systems [[electronic resource] ] : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (VIII, 393 p. 131 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Management information systems
Computer science
Computer logic
Application software
Data encryption (Computer science)
Systems and Data Security
Software Engineering
Management of Computing and Information Systems
Logics and Meanings of Programs
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-07452-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements and Architecture: Lessons Learned -- STS-Tool: Security Requirements Engineering for Socio-Technical Systems -- Model-Driven Development of a Secure eHealth Application -- Modeling Security Features of Web Applications -- On the Synthesis of Secure Services Composition -- Privacy and Access Control in Federated Social Networks -- Engineering Trust-Awareness and Self-adaptability in Services and Systems -- Validation of Access Control Systems -- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle -- A Toolchain for Designing and Testing Access Control Policies -- Verification of Authorization Policies Modified by Delegation -- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System -- Divide and Conquer – Towards a Notion of Risk Model Encapsulation -- Preserving Data Privacy in e-Health.
Record Nr. UNISA-996217780903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Engineering Secure Future Internet Services and Systems : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli
Engineering Secure Future Internet Services and Systems : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli
Pubbl/distr/stampa Cham : , : Springer International Publishing : , 2014
Descrizione fisica 1 recurso en línea (VIII, 393 p. 131 illus.)
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Management information systems
Computer science
Computer logic
Application software
Data encryption (Computer science)
Seguridad informática
Systems and Data Security
Software Engineering
Management of Computing and Information Systems
Logics and Meanings of Programs
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-07452-0
9783319074511
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements and Architecture: Lessons Learned -- STS-Tool: Security Requirements Engineering for Socio-Technical Systems -- Model-Driven Development of a Secure eHealth Application -- Modeling Security Features of Web Applications -- On the Synthesis of Secure Services Composition -- Privacy and Access Control in Federated Social Networks -- Engineering Trust-Awareness and Self-adaptability in Services and Systems -- Validation of Access Control Systems -- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle -- A Toolchain for Designing and Testing Access Control Policies -- Verification of Authorization Policies Modified by Delegation -- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System -- Divide and Conquer – Towards a Notion of Risk Model Encapsulation -- Preserving Data Privacy in e-Health.
Record Nr. UNINA-9910484706603321
Cham : , : Springer International Publishing : , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings / / edited by Miguel Soriano, Sihan Qing, Javier López
Information and Communications Security [[electronic resource] ] : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings / / edited by Miguel Soriano, Sihan Qing, Javier López
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 474 p. 120 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Data structures (Computer science)
Coding theory
Information theory
Algorithms
Computer communication systems
Systems and Data Security
Cryptology
Data Structures and Information Theory
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 1-280-39076-X
9786613568687
3-642-17650-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory and Practice -- Session 1A. Access Control -- Rewriting of SPARQL/Update Queries for Securing Data Access -- Fine-Grained Disclosure of Access Policies -- Session 1B. Public Key Cryptography and Cryptanalysis -- Manger’s Attack Revisited -- Horizontal Correlation Analysis on Exponentiation -- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts -- Session 1C. Security in Distributed and Mobile Systems -- A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks -- CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization -- SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms -- Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol -- Compromise-Resilient Anti-jamming for Wireless Sensor Networks -- Session 1D. Cryptanalysis -- On Practical Second-Order Power Analysis Attacks for Block Ciphers -- Consecutive S-box Lookups: A Timing Attack on SNOW 3G -- Session 2A. Authentication -- Efficient Authentication for Mobile and Pervasive Computing -- Security Enhancement and Modular Treatment towards Authenticated Key Exchange -- Federated Secret Handshakes with Support for Revocation -- Session 2B. Fair Exchange Protocols -- An Agent-Mediated Fair Exchange Protocol -- A New Method for Formalizing Optimistic Fair Exchange Protocols -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C. Anonymity and Privacy -- Proving Coercion-Resistance of Scantegrity II -- Anonymity and Verifiability in Voting: Understanding (Un)Linkability -- A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms -- Time Warp: How Time Affects Privacy in LBSs -- Session 2D. Software Security -- Return-Oriented Rootkit without Returns (on the x86) -- Experimental Threat Model Reuse with Misuse Case Diagrams -- Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis -- Session 3A. Proxy Cryptosystems -- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities -- Ciphertext Policy Attribute-Based Proxy Re-encryption -- Session 3B. Intrusion Detection Systems -- Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks -- A Trust-Based IDS for the AODV Protocol -- IDS Alert Visualization and Monitoring through Heuristic Host Selection -- A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Record Nr. UNISA-996466020503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Information and Communications Security [[electronic resource] ] : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 572 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-30191-7
3-540-23563-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
Record Nr. UNISA-996465286403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Information and Communications Security : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 572 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Management information systems
Computer science
Algorithms
Computer networks
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-30191-7
3-540-23563-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
Record Nr. UNINA-9910144344703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.4
Soggetto topico Ubiquitous computing - Security measures
Wireless communication systems
Engineering & Applied Sciences
Computer Science
ISBN 1-5090-9476-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996197577803316
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2006
Disciplina 005.4
Soggetto topico Ubiquitous computing - Security measures
Wireless communication systems
Engineering & Applied Sciences
Computer Science
ISBN 9781509094769
1509094768
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145620503321
[Place of publication not identified], : IEEE Computer Society, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 235 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-22906-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology.
Record Nr. UNISA-996200367403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust, Privacy and Security in Digital Business : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Trust, Privacy and Security in Digital Business : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 235 p. 68 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Computer communication systems
Systems and Data Security
Management of Computing and Information Systems
Computer Communication Networks
ISBN 3-319-22906-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology.
Record Nr. UNINA-9910485027503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Javier López
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Javier López
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 199 p. 54 illus.)
Disciplina 006.312
Collana Security and Cryptology
Soggetto topico Data mining
Database management
Artificial intelligence
Data Mining and Knowledge Discovery
Database Management
Artificial Intelligence
ISBN 3-642-40343-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Access control and authentication -- Identity and trust management -- privacy and confidentiality management -- Information systems security -- Security policies/legal issues.- Trust and privacy in mobile and pervasive environments.
Record Nr. UNISA-996465704503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui