|
|
|
|
LEADER |
02980nam a22005295i 4500 |
001 |
978-3-642-40576-1 |
003 |
DE-He213 |
005 |
20151109191836.0 |
007 |
cr nn 008mamaa |
008 |
130814s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642405761
|9 978-3-642-40576-1
|
024 |
7 |
|
|a 10.1007/978-3-642-40576-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security in Computing and Communications
|h [electronic resource] :
|b International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings /
|c edited by Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XVI, 404 p. 149 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 377
|
505 |
0 |
|
|a A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature Embedding in the Functional Description of Reversible -- Circuit -- Detecting Laser Fault Injection for Smart Cards Using Security Automata -- Virtual World Authentication Using the Smart Card Web Server -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a E-commerce.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a e-Commerce/e-business.
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|
700 |
1 |
|
|a Atrey, Pradeep K.
|e editor.
|
700 |
1 |
|
|a Fan, Chun-I.
|e editor.
|
700 |
1 |
|
|a Perez, Gregorio Martinez.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642405754
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 377
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-40576-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|