000 | 03066nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-319-15618-7 | ||
003 | DE-He213 | ||
005 | 20240730174008.0 | ||
007 | cr nn 008mamaa | ||
008 | 150227s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319156187 _9978-3-319-15618-7 |
||
024 | 7 |
_a10.1007/978-3-319-15618-7 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEngineering Secure Software and Systems _h[electronic resource] : _b7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / _cedited by Frank Piessens, Juan Caballero, Nataliia Bielova. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXII, 227 p. 63 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v8978 |
|
505 | 0 | _aFormal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. | |
520 | _aThis book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9110667 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aMathematical Applications in Computer Science. _931683 |
650 | 2 | 4 |
_aModels of Computation. _931806 |
700 | 1 |
_aPiessens, Frank. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9110668 |
|
700 | 1 |
_aCaballero, Juan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9110669 |
|
700 | 1 |
_aBielova, Nataliia. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9110670 |
|
710 | 2 |
_aSpringerLink (Online service) _9110671 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319156170 |
776 | 0 | 8 |
_iPrinted edition: _z9783319156194 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v8978 _9110672 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-15618-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89207 _d89207 |