|
|
|
|
LEADER |
03000nam a22005895i 4500 |
001 |
978-3-642-31909-9 |
003 |
DE-He213 |
005 |
20151111061132.0 |
007 |
cr nn 008mamaa |
008 |
120923s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642319099
|9 978-3-642-31909-9
|
024 |
7 |
|
|a 10.1007/978-3-642-31909-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Privacy in Communication Networks
|h [electronic resource] :
|b 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers /
|c edited by Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 548 p. 174 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 96
|
505 |
0 |
|
|a network intrusion detection -- anonymity and privacy -- wireless security -- system security -- DNS and routing secuity -- key management.
|
520 |
|
|
|a This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Operating Systems.
|
700 |
1 |
|
|a Rajarajan, Muttukrishnan.
|e editor.
|
700 |
1 |
|
|a Piper, Fred.
|e editor.
|
700 |
1 |
|
|a Wang, Haining.
|e editor.
|
700 |
1 |
|
|a Kesidis, George.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642319082
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 96
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31909-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|