000 | 02951nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-10-2738-3 | ||
003 | DE-He213 | ||
005 | 20200421111842.0 | ||
007 | cr nn 008mamaa | ||
008 | 160916s2016 si | s |||| 0|eng d | ||
020 |
_a9789811027383 _9978-981-10-2738-3 |
||
024 | 7 |
_a10.1007/978-981-10-2738-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity in Computing and Communications _h[electronic resource] : _b4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings / _cedited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero. |
264 | 1 |
_aSingapore : _bSpringer Singapore : _bImprint: Springer, _c2016. |
|
300 |
_aXXII, 474 p. 179 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v625 |
|
505 | 0 | _aCryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. . | |
520 | _aThis book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security. . | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Structures. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aMueller, Peter. _eeditor. |
|
700 | 1 |
_aThampi, Sabu M. _eeditor. |
|
700 | 1 |
_aAlam Bhuiyan, Md Zakirul. _eeditor. |
|
700 | 1 |
_aKo, Ryan. _eeditor. |
|
700 | 1 |
_aDoss, Robin. _eeditor. |
|
700 | 1 |
_aAlcaraz Calero, Jose M. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9789811027376 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v625 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-981-10-2738-3 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c55603 _d55603 |