000 | 03464nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-04283-1 | ||
003 | DE-He213 | ||
005 | 20200421112051.0 | ||
007 | cr nn 008mamaa | ||
008 | 131217s2013 gw | s |||| 0|eng d | ||
020 |
_a9783319042831 _9978-3-319-04283-1 |
||
024 | 7 |
_a10.1007/978-3-319-04283-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Privacy in Communication Networks _h[electronic resource] : _b9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers / _cedited by Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2013. |
|
300 |
_aXII, 420 p. 142 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v127 |
|
505 | 0 | _aSecurity & amp; Privacy in Mobile, Sensor and Ad Hoc Networks -- Malware, Botnets and Distributed Denial of Service -- Security for Emerging Technologies: VoIP, Peer-to-peer and Cloud Computing -- Encryption and Key Management -- Security in Software and Machine Learning -- Network and System Security Model -- Security and Privacy in Pervasive and Ubiquitous Computing ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor, and ad hoc networks; malware, botnets, and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer, and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aZia, Tanveer. _eeditor. |
|
700 | 1 |
_aZomaya, Albert. _eeditor. |
|
700 | 1 |
_aVaradharajan, Vijay. _eeditor. |
|
700 | 1 |
_aMao, Morley. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319042824 |
830 | 0 |
_aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, _x1867-8211 ; _v127 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-04283-1 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c57176 _d57176 |