000 | 02981nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-642-40576-1 | ||
003 | DE-He213 | ||
005 | 20200421112045.0 | ||
007 | cr nn 008mamaa | ||
008 | 130814s2013 gw | s |||| 0|eng d | ||
020 |
_a9783642405761 _9978-3-642-40576-1 |
||
024 | 7 |
_a10.1007/978-3-642-40576-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity in Computing and Communications _h[electronic resource] : _bInternational Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings / _cedited by Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2013. |
|
300 |
_aXVI, 404 p. 149 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v377 |
|
505 | 0 | _aA Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature Embedding in the Functional Description of Reversible -- Circuit -- Detecting Laser Fault Injection for Smart Cards Using Security Automata -- Virtual World Authentication Using the Smart Card Web Server -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. | |
520 | _aThis book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aE-commerce. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _ae-Commerce/e-business. |
700 | 1 |
_aThampi, Sabu M. _eeditor. |
|
700 | 1 |
_aAtrey, Pradeep K. _eeditor. |
|
700 | 1 |
_aFan, Chun-I. _eeditor. |
|
700 | 1 |
_aPerez, Gregorio Martinez. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642405754 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v377 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-40576-1 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c56845 _d56845 |