|
|
|
|
LEADER |
02252nmm a2200421 u 4500 |
001 |
EB000390163 |
003 |
EBX01000000000000000243216 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642328053
|
100 |
1 |
|
|a De Decker, Bart
|e [editor]
|
245 |
0 |
0 |
|a Communications and Multimedia Security
|h Elektronische Ressource
|b 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012, Proceedings
|c edited by Bart De Decker, David W. Chadwick
|
250 |
|
|
|a 1st ed. 2012
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012, 2012
|
300 |
|
|
|a VIII, 239 p. 57 illus
|b online resource
|
505 |
0 |
|
|a Image and Handwriting Analysis -- Authentication and Performance -- Biometrics, Forensics and Watermarking -- Communications Security
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Electronic commerce
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Biometrics
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a e-Commerce and e-Business
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Biometric identification
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Chadwick, David W.
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-32805-3
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-32805-3?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security
|