top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXVI, 480 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-03584-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data.
Record Nr. UNISA-996465385903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XXVI, 480 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer networks
Data encryption (Computer science)
Computers and civilization
Systems and Data Security
Computer Communication Networks
Cryptology
Computers and Society
ISBN 3-319-03584-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data.
Record Nr. UNINA-9910483379903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
From Database to Cyber Security [[electronic resource] ] : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
From Database to Cyber Security [[electronic resource] ] : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 3-030-04834-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. .
Record Nr. UNISA-996466211803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Computers and civilization
Application software
Systems and Data Security
Cryptology
Computer Communication Networks
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 3-030-04834-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. .
Record Nr. UNINA-9910349389203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Information Systems Security [[electronic resource] ] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 404 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 3-642-45204-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Record Nr. UNISA-996465508303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 404 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computer communication systems
Systems and Data Security
Cryptology
Computer Communication Networks
ISBN 3-642-45204-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Record Nr. UNINA-9910482973603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy and Anonymity in Computation, Communication and Storage [[electronic resource] ] : SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Security, Privacy and Anonymity in Computation, Communication and Storage [[electronic resource] ] : SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIV, 392 p. 140 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Application software
Computer communication systems
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 3-319-49145-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465475603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy and Anonymity in Computation, Communication and Storage : SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Security, Privacy and Anonymity in Computation, Communication and Storage : SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIV, 392 p. 140 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Application software
Computer communication systems
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 3-319-49145-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484402703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 508 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer communication systems
Privacy
Cryptology
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-319-49148-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Algorithms and Architectures -- Policies -- Regulations and Techniques -- Anonymous Computation and Communication -- Security -- Privacy -- Anonymity.
Record Nr. UNISA-996465473703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Anonymity in Computation, Communication, and Storage : 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Security, Privacy, and Anonymity in Computation, Communication, and Storage : 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 508 p. 149 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Algorithms
Computer communication systems
Privacy
Cryptology
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-319-49148-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Algorithms and Architectures -- Policies -- Regulations and Techniques -- Anonymous Computation and Communication -- Security -- Privacy -- Anonymity.
Record Nr. UNINA-9910484402803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui