|
|
|
|
LEADER |
02879nam a22005655i 4500 |
001 |
978-3-642-21040-2 |
003 |
DE-He213 |
005 |
20151204150848.0 |
007 |
cr nn 008mamaa |
008 |
110602s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642210402
|9 978-3-642-21040-2
|
024 |
7 |
|
|a 10.1007/978-3-642-21040-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
|h [electronic resource] :
|b 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings /
|c edited by Claudio A. Ardagna, Jianying Zhou.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2011.
|
300 |
|
|
|a XIII, 392 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 6633
|
520 |
|
|
|a This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Ardagna, Claudio A.
|e editor.
|
700 |
1 |
|
|a Zhou, Jianying.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642210396
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 6633
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-21040-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|