Cyberspace Safety and Security [[electronic resource] ] : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XXVI, 480 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Computers and civilization Systems and Data Security Computer Communication Networks Cryptology Computers and Society |
ISBN | 3-319-03584-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. |
Record Nr. | UNISA-996465385903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cyberspace Safety and Security : 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XXVI, 480 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer networks Data encryption (Computer science) Computers and civilization Systems and Data Security Computer Communication Networks Cryptology Computers and Society |
ISBN | 3-319-03584-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Crawler Guard for Quickly Blocking Unauthorized Web Robot -- Privacy Preserving for Location-Based Services Using Location Transformation -- Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux -- Multiple-Bank E-Cash without Random Oracles -- A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy -- Preserving User Privacy in the Smart Grid by Hiding Appliance Load Characteristics -- Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures -- Towards a Security-Enhanced Firewall Application for OpenFlow Networks -- Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method -- Detection of Covert Botnet Command and Control Channels by Causal Analysis of Traffic Flows -- Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks -- Geolocation and Verification of IP-Addresses with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks -- Alert Correlation Algorithms: A Survey and Taxonomy -- Construction and Verification of Mobile Ad Hoc Network Protocols -- Zero-Day Traffic Identification -- Design and Implementation of a Testbed for the Security Assessment of MANETs -- A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology -- Anonymous Identity-Based Broadcast Encryption with Adaptive Security -- Hierarchical Identity-Based Signature with Short Public Keys -- PeerViewer: Behavioral Tracking and Classification of P2P Malware -- Selecting Features for Anomaly Intrusion Detection: A Novel Method Using Fuzzy C Means and Decision Tree Classification -- Detecting Stepping Stones by Abnormal Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis and Improvement of an ECC-Based Password Authentication Scheme Using Smart Cards -- The Hot-Spots Problem in Windows 8 Graphical Password Scheme -- Static Detection of Dangerous Behaviors in Android Apps -- A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function -- A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing -- NetSecRadar: A Visualization System for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System -- Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN -- An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space -- An Out-of-the-Box Dynamic Binary Analysis Tool for ARM-Based Linux -- Towards an Open Framework Leveraging a Trusted Execution Environment -- Secure Re-publication of Dynamic Big Data. |
Record Nr. | UNINA-9910483379903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
From Database to Cyber Security [[electronic resource] ] : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computers and civilization Application software Systems and Data Security Cryptology Computer Communication Networks Computers and Society Information Systems Applications (incl. Internet) |
ISBN | 3-030-04834-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. . |
Record Nr. | UNISA-996466211803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday / / edited by Pierangela Samarati, Indrajit Ray, Indrakshi Ray |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 487 p. 147 illus., 98 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Computers and civilization Application software Systems and Data Security Cryptology Computer Communication Networks Computers and Society Information Systems Applications (incl. Internet) |
ISBN | 3-030-04834-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field -- Policy Engineering in RBAC and ABAC -- Comprehensive Security Assurance Measures for Virtualized Server Environments -- Stratification Based Model for Security Policy with Exceptions and Contraries to Duty -- Asymptotic Behavior of Attack Graph Games -- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything -- Protecting Resources and Regulating Access in Cloud-based Object Storage -- Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations -- Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives -- Access Privacy in the Cloud -- A Strategy for Effective Alert Analysis at a Cyber Security Operations Center -- Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers -- Supporting Users in Cloud Plan Selection -- Distributed Services Attestation in IoT -- Exploiting Data Sensitivity on Partitioned Data -- A Review of Graph Approaches to Network Security Analytics -- Advanced Biometric Technologies: Emerging Scenarios and Research Trends -- Attribute-Based Encryption: Applications and Future Directions -- Static Analysis for Security Vetting of Android Apps -- Breaking Bad: Forecasting Adversarial Android Bad Behavior -- Bot or Human? A Behavior-based Online Bot Detection System -- Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks -- Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. . |
Record Nr. | UNINA-9910349389203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Systems Security [[electronic resource] ] : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 404 p. 70 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Systems and Data Security Cryptology Computer Communication Networks |
ISBN | 3-642-45204-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. |
Record Nr. | UNISA-996465508303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Systems Security : 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings / / edited by Aditya Bagchi, Indrakshi Ray |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 404 p. 70 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computer communication systems Systems and Data Security Cryptology Computer Communication Networks |
ISBN | 3-642-45204-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Challenges and Opportunities for Security with Differential Privacy -- An Encrypted In-Memory Column-Store: The Onion Selection Problem -- Risk Aware Approach to Data Confidentiality in Cloud Computing -- Jamming Resistant Schemes for Wireless Communication -- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card -- Signcryption from Randomness Recoverable PKE Revisited -- Auctions with Rational Adversary -- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic Services -- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples Approach -- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management -- Secure States versus Secure Executions - From Access Control to Flow Control -- Monitoring for Slow Suspicious Activities Using a Target Centric Approach -- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers -- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing -- Web Services Based Attacks against Image CAPTCHAs -- New Long-Term Glimpse of RC4 Stream Cipher -- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols -- Information Theoretical Analysis of Side-Channel Attack -- Efficient Multi-bit Image Steganography in Spatial Domain -- Evolutionary Multibit Grouping Steganographic Algorithm -- Let the Right One in: Discovering and Mitigating Permission Gaps -- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANET -- Recipient Anonymous Ciphertext-Policy Attribute Based Encryption -- Error Correction of Partially Exposed RSA Private Keys from MSB Side -- Efficient Enforcement of Privacy for Moving Object Trajectories -- An Administrative Model for Spatio-Temporal Role Based Access Control -- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. |
Record Nr. | UNINA-9910482973603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy and Anonymity in Computation, Communication and Storage [[electronic resource] ] : SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXIV, 392 p. 140 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Management information systems Computer science Application software Computer communication systems Systems and Data Security Security Cryptology Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computer Communication Networks |
ISBN | 3-319-49145-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465475603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy and Anonymity in Computation, Communication and Storage : SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XXIV, 392 p. 140 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Data encryption (Computer science) Management information systems Computer science Application software Computer communication systems Systems and Data Security Security Cryptology Management of Computing and Information Systems Information Systems Applications (incl. Internet) Computer Communication Networks |
ISBN | 3-319-49145-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484402703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 508 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Algorithms Computer communication systems Privacy Cryptology Coding and Information Theory Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-319-49148-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Algorithms and Architectures -- Policies -- Regulations and Techniques -- Anonymous Computation and Communication -- Security -- Privacy -- Anonymity. |
Record Nr. | UNISA-996465473703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage : 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / / edited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 508 p. 149 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Algorithms Computer communication systems Privacy Cryptology Coding and Information Theory Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-319-49148-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Algorithms and Architectures -- Policies -- Regulations and Techniques -- Anonymous Computation and Communication -- Security -- Privacy -- Anonymity. |
Record Nr. | UNINA-9910484402803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|