|
|
|
|
LEADER |
03044nam a22006015i 4500 |
001 |
978-3-319-25645-0 |
003 |
DE-He213 |
005 |
20151124203205.0 |
007 |
cr nn 008mamaa |
008 |
151123s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319256450
|9 978-3-319-25645-0
|
024 |
7 |
|
|a 10.1007/978-3-319-25645-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Network and System Security
|h [electronic resource] :
|b 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings /
|c edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIV, 542 p. 126 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9408
|
505 |
0 |
|
|a Wireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications and network security.
|
520 |
|
|
|a This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security. .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Qiu, Meikang.
|e editor.
|
700 |
1 |
|
|a Xu, Shouhuai.
|e editor.
|
700 |
1 |
|
|a Yung, Moti.
|e editor.
|
700 |
1 |
|
|a Zhang, Haibo.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319256443
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 9408
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-25645-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|