|
|
|
|
LEADER |
02372nmm a2200421 u 4500 |
001 |
EB001086535 |
003 |
EBX01000000000000000845899 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
151215 ||| eng |
020 |
|
|
|a 9783319256450
|
100 |
1 |
|
|a Qiu, Meikang
|e [editor]
|
245 |
0 |
0 |
|a Network and System Security
|h Elektronische Ressource
|b 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings
|c edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang
|
250 |
|
|
|a 1st ed. 2015
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2015, 2015
|
300 |
|
|
|a XIV, 542 p. 126 illus. in color
|b online resource
|
505 |
0 |
|
|a Wireless security and privacy -- Smartphone security -- Systems security.-Applications security -- Security management -- Applied cryptography.-Cryptosystems -- Cryptographic mechanisms -- Security mechanisms -- Mobile and cloud security -- Applications and network security
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Xu, Shouhuai
|e [editor]
|
700 |
1 |
|
|a Yung, Moti
|e [editor]
|
700 |
1 |
|
|a Zhang, Haibo
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-319-25645-0
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-25645-0?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; applications security; security management; applied cryptography; cryptosystems; cryptographic mechanisms; security mechanisms; mobile and cloud security; applications and network security.
|