|
|
|
|
LEADER |
02164nmm a2200421 u 4500 |
001 |
EB000387347 |
003 |
EBX01000000000000000240399 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642225406
|
100 |
1 |
|
|a Wyld, David C.
|e [editor]
|
245 |
0 |
0 |
|a Advances in Network Security and Applications
|h Elektronische Ressource
|b 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings
|c edited by David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
|
250 |
|
|
|a 1st ed. 2011
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2011, 2011
|
300 |
|
|
|a XVIII, 660 p
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Software engineering
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Software Engineering
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Wozniak, Michal
|e [editor]
|
700 |
1 |
|
|a Chaki, Nabendu
|e [editor]
|
700 |
1 |
|
|a Meghanathan, Natarajan
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Communications in Computer and Information Science
|
028 |
5 |
0 |
|a 10.1007/978-3-642-22540-6
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-22540-6?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 004.6
|
520 |
|
|
|a This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management
|