|
|
|
|
LEADER |
02954nam a22005895i 4500 |
001 |
978-3-642-34135-9 |
003 |
DE-He213 |
005 |
20151031081032.0 |
007 |
cr nn 008mamaa |
008 |
120910s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642341359
|9 978-3-642-34135-9
|
024 |
7 |
|
|a 10.1007/978-3-642-34135-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Recent Trends in Computer Networks and Distributed Systems Security
|h [electronic resource] :
|b International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings /
|c edited by Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XXI, 508 p. 207 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 335
|
505 |
0 |
|
|a a novel key management mechanism for dynamic hierarchical access control based on linear polynomials -- performance evaluation of the fuzzy ARTMAP for network intrusion detection -- ID-based threshold signcryption and group unsigncryption -- protocol for secure submissions into learning management systems.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|
700 |
1 |
|
|a Zomaya, Albert Y.
|e editor.
|
700 |
1 |
|
|a Strufe, Thorsten.
|e editor.
|
700 |
1 |
|
|a Alcaraz Calero, Jose M.
|e editor.
|
700 |
1 |
|
|a Thomas, Tony.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642341342
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 335
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34135-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|