|
|
|
|
LEADER |
02712nam a22006015i 4500 |
001 |
978-3-642-34601-9 |
003 |
DE-He213 |
005 |
20151030031252.0 |
007 |
cr nn 008mamaa |
008 |
121116s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642346019
|9 978-3-642-34601-9
|
024 |
7 |
|
|a 10.1007/978-3-642-34601-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Network and System Security
|h [electronic resource] :
|b 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings /
|c edited by Li Xu, Elisa Bertino, Yi Mu.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIV, 532 p. 133 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7645
|
505 |
0 |
|
|a network security -- system security -- public key cryptography -- privacy -- authentication -- security analysis.- access control.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Database management.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a E-commerce.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Database Management.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a e-Commerce/e-business.
|
700 |
1 |
|
|a Xu, Li.
|e editor.
|
700 |
1 |
|
|a Bertino, Elisa.
|e editor.
|
700 |
1 |
|
|a Mu, Yi.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642346002
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7645
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34601-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|