|
|
|
|
LEADER |
02075nmm a2200433 u 4500 |
001 |
EB000390678 |
003 |
EBX01000000000000000243731 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642346019
|
100 |
1 |
|
|a Xu, Li
|e [editor]
|
245 |
0 |
0 |
|a Network and System Security
|h Elektronische Ressource
|b 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings
|c edited by Li Xu, Elisa Bertino, Yi Mu
|
250 |
|
|
|a 1st ed. 2012
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012, 2012
|
300 |
|
|
|a XIV, 532 p. 133 illus
|b online resource
|
505 |
0 |
|
|a network security -- system security -- public key cryptography -- privacy -- authentication -- security analysis.- access control
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Electronic commerce
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Database Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a e-Commerce and e-Business
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Database management
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Bertino, Elisa
|e [editor]
|
700 |
1 |
|
|a Mu, Yi
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-34601-9
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-34601-9?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control
|