|
|
|
|
LEADER |
02950nam a22005775i 4500 |
001 |
978-981-10-2738-3 |
003 |
DE-He213 |
005 |
20160916053112.0 |
007 |
cr nn 008mamaa |
008 |
160916s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811027383
|9 978-981-10-2738-3
|
024 |
7 |
|
|a 10.1007/978-981-10-2738-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security in Computing and Communications
|h [electronic resource] :
|b 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings /
|c edited by Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XXII, 474 p. 179 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 625
|
505 |
0 |
|
|a Cryptosystems, algorithms, primitives -- Security and privacy in networked systems -- System and network security -- Steganography, visual cryptography, image forensics -- Applications security. .
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security. .
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Structures.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Mueller, Peter.
|e editor.
|
700 |
1 |
|
|a Thampi, Sabu M.
|e editor.
|
700 |
1 |
|
|a Alam Bhuiyan, Md Zakirul.
|e editor.
|
700 |
1 |
|
|a Ko, Ryan.
|e editor.
|
700 |
1 |
|
|a Doss, Robin.
|e editor.
|
700 |
1 |
|
|a Alcaraz Calero, Jose M.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811027376
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 625
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-981-10-2738-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|