000 | 03170nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-28166-2 | ||
003 | DE-He213 | ||
005 | 20240730190227.0 | ||
007 | cr nn 008mamaa | ||
008 | 120210s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642281662 _9978-3-642-28166-2 |
||
024 | 7 |
_a10.1007/978-3-642-28166-2 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEngineering Secure Software and Systems _h[electronic resource] : _b4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings / _cedited by Gilles Barthe, Ben Livshits, Riccardo Scandariato. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 151 p. 37 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7159 |
|
520 | _aThis book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012. The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions. The full papers present new research results in the field of engineering secure software and systems, whereas the idea papers give crisp expositions of interesting, novel ideas in the early stages of development. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9141727 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aMathematical Applications in Computer Science. _931683 |
650 | 2 | 4 |
_aModels of Computation. _931806 |
700 | 1 |
_aBarthe, Gilles. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141728 |
|
700 | 1 |
_aLivshits, Ben. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141729 |
|
700 | 1 |
_aScandariato, Riccardo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9141730 |
|
710 | 2 |
_aSpringerLink (Online service) _9141731 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642281655 |
776 | 0 | 8 |
_iPrinted edition: _z9783642281679 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7159 _9141732 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-28166-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93147 _d93147 |