top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Computer Security [[electronic resource] ] : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 233 p. 108 illus., 78 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Delitos por ordenador
Computers
Law and legislation
Computer organization
Software engineering
Application software
Systems and Data Security
Computer Crime
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-030-12786-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466343703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Computer Security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers / / edited by Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 233 p. 108 illus., 78 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Delitos por ordenador
Computers
Law and legislation
Computer organization
Software engineering
Application software
Systems and Data Security
Computer Crime
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Software Engineering
Information Systems Applications (incl. Internet)
ISBN 3-030-12786-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910337578903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIX, 621 p. 136 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Seguridad informática
Criptografía
Computers and civilization
Computers
Law and legislation
Computer organization
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
ISBN 3-319-99073-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II).
Record Nr. UNISA-996466456103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Computer Security [[electronic resource] ] : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIX, 571 p. 104 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Criptografía
Computers and civilization
Computers
Law and legislation
Computer organization
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
ISBN 3-319-98989-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II).
Record Nr. UNISA-996466322503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIX, 621 p. 136 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Seguridad informática
Criptografía
Computers and civilization
Computers
Law and legislation
Computer organization
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
ISBN 3-319-99073-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II).
Record Nr. UNINA-9910349415003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II / / edited by Javier Lopez, Jianying Zhou, Miguel Soriano
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIX, 571 p. 104 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Criptografía
Computers and civilization
Computers
Law and legislation
Computer organization
Systems and Data Security
Cryptology
Computers and Society
Legal Aspects of Computing
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
ISBN 3-319-98989-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Software security -- Blockchain & machine Learning -- Hardware security -- Attacks -- Malware & vulnerabilities -- Protocol security -- Privacy (I) -- CPS and IoT security -- Mobile security -- Database & web security -- Cloud security -- Applied crypto (I) -- Privacy (II) -- Multi-party computation -- SDN security -- Applied crypto (II).
Record Nr. UNINA-9910349416603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Computer Security - ESORICS 2008 [[electronic resource] ] : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 602 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Seguridad informática
Computer communication systems
Computer software—Reusability
E-commerce
Management information systems
Computer science
Cryptology
Theory of Computation
Computer Communication Networks
Performance and Reliability
e-Commerce/e-business
Management of Computing and Information Systems
ISBN 3-540-88313-4
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security.
Record Nr. UNISA-996466104103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings / / edited by Sushil Jajodia
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIV, 602 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Seguridad informática
Computer communication systems
Computer software—Reusability
E-commerce
Management information systems
Computer science
Cryptology
Theory of Computation
Computer Communication Networks
Performance and Reliability
e-Commerce/e-business
Management of Computing and Information Systems
ISBN 3-540-88313-4
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1: Intrusion Detection and Network Vulnerability Analysis -- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW -- Identifying Critical Attack Assets in Dependency Attack Graphs -- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory -- Session 2: Network Security -- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough -- Session 3: Smart Cards and Identity Management -- Dismantling MIFARE Classic -- A Browser-Based Kerberos Authentication Scheme -- CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud -- Session 4: Data and Applications Security -- Disclosure Analysis and Control in Statistical Databases -- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead -- Access Control Friendly Query Verification for Outsourced Data Publishing -- Session 5: Privacy Enhancing Technologies -- Sharemind: A Framework for Fast Privacy-Preserving Computations -- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms -- Remote Integrity Check with Dishonest Storage Server -- Session 6: Anonymity and RFID Privacy -- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks -- RFID Privacy Models Revisited -- A New Formal Proof Model for RFID Location Privacy -- Session 7: Access Control and Trust Negotiation -- Distributed Authorization by Multiparty Trust Negotiation -- Compositional Refinement of Policies in UML – Exemplified for Access Control -- On the Security of Delegation in Access Control Systems -- Session 8: Information Flow and Non-transferability -- Termination-Insensitive Noninterference Leaks More Than Just a Bit -- Security Provisioning in Pervasive Environments Using Multi-objective Optimization -- Improved Security Notions and Protocols for Non-transferable Identification -- Session 9: Secure Electronic Voting and Web Applications Security -- Human Readable Paper Verification of Prêt à Voter -- A Distributed Implementation of the Certified Information Access Service -- Exploring User Reactions to New Browser Cues for Extended Validation Certificates -- A Framework for the Analysis of Mix-Based Steganographic File Systems -- Session 10: VoIP Security, Malware, and DRM -- An Adaptive Policy-Based Approach to SPIT Management -- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? -- Eureka: A Framework for Enabling Static Malware Analysis -- New Considerations about the Correct Design of Turbo Fingerprinting Codes -- Session 11: Formal Models and Cryptographic Protocols -- Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks -- Cryptographic Protocol Explication and End-Point Projection -- State Space Reduction in the Maude-NRL Protocol Analyzer -- Session 12: Language-Based and Hardware Security -- Code-Carrying Authorization -- CPU Bugs, CPU Backdoors and Consequences on Security.
Record Nr. UNINA-9910482961603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2010 [[electronic resource] ] : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings / / edited by Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou
Computer Security - ESORICS 2010 [[electronic resource] ] : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings / / edited by Dimitris Gritzalis, Bart Preneel, Marianthi Theoharidou
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 718 p. 163 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Data encryption (Computer science)
Computer programming
Management information systems
Computer science
Algorithms
Computers and civilization
Computer Communication Networks
Cryptology
Programming Techniques
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 1-280-38869-2
9786613566614
3-642-15497-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto RFID and Privacy -- A New Framework for RFID Privacy -- Readers Behaving Badly -- Privacy-Preserving, Taxable Bank Accounts -- Formal Analysis of Privacy for Vehicular Mix-Zones -- Software Security -- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time -- A Theory of Runtime Enforcement, with Results -- Enforcing Secure Object Initialization in Java -- Flexible Scheduler-Independent Security -- Cryptographic Protocols -- Secure Multiparty Linear Programming Using Fixed-Point Arithmetic -- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols -- Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model -- DR@FT: Efficient Remote Attestation Framework for Dynamic Systems -- Traffic Analysis -- Website Fingerprinting and Identification Using Ordered Feature Sequences -- Web Browser History Detection as a Real-World Privacy Threat -- On the Secrecy of Spread-Spectrum Flow Watermarks -- Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation -- End-User Security -- A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection -- Kamouflage: Loss-Resistant Password Management -- Formal Analysis -- Sequential Protocol Composition in Maude-NPA -- Verifying Security Property of Peer-to-Peer Systems Using CSP -- Modeling and Analyzing Security in the Presence of Compromising Adversaries -- On Bounding Problems of Quantitative Information Flow -- E-voting and Broadcast -- On E-Vote Integrity in the Case of Malicious Voter Computers -- Election Verifiability in Electronic Voting Protocols -- Pretty Good Democracy for More Expressive Voting Schemes -- Efficient Multi-dimensional Key Management in Broadcast Services -- Authentication, Access Control, Authorization and Attestation -- Caught in the Maze of Security Standards -- User-Role Reachability Analysis of Evolving Administrative Role Based Access Control -- An Authorization Framework Resilient to Policy Evaluation Failures -- Optimistic Fair Exchange with Multiple Arbiters -- Anonymity and Unlinkability -- Speaker Recognition in Encrypted Voice Streams -- Evaluating Adversarial Partitions -- Providing Mobile Users’ Anonymity in Hybrid Networks -- Complexity of Anonymity for Security Protocols -- Network Security and Economics -- k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks -- Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information -- RatFish: A File Sharing Protocol Provably Secure against Rational Users -- A Service Dependency Model for Cost-Sensitive Intrusion Response -- Secure Update, DOS and Intrustion Detection -- Secure Code Update for Embedded Devices via Proofs of Secure Erasure -- D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks -- Low-Cost Client Puzzles Based on Modular Exponentiation -- Expressive, Efficient and Obfuscation Resilient Behavior Based IDS.
Record Nr. UNISA-996465704603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2011 [[electronic resource] ] : 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings / / edited by Vijay Atluri, Claudia Diaz
Computer Security – ESORICS 2011 [[electronic resource] ] : 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings / / edited by Vijay Atluri, Claudia Diaz
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 686 p. 134 illus., 63 illus. in color.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Seguridad informática
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Application software
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Information Systems Applications (incl. Internet)
ISBN 3-642-23822-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466238903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui