000 | 02826nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-49148-6 | ||
003 | DE-He213 | ||
005 | 20200421111652.0 | ||
007 | cr nn 008mamaa | ||
008 | 161109s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319491486 _9978-3-319-49148-6 |
||
024 | 7 |
_a10.1007/978-3-319-49148-6 _2doi |
|
245 | 1 | 0 |
_aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage _h[electronic resource] : _b9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings / _cedited by Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXVI, 508 p. 149 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v10066 |
|
505 | 0 | _aSecurity Algorithms and Architectures -- Policies -- Regulations and Techniques -- Anonymous Computation and Communication -- Security -- Privacy -- Anonymity. | |
520 | _aThis book constitutes the refereed proceedings of the 9th International Conference on on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016. The 40 papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aAlgorithms. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aPrivacy. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aWang, Guojun. _eeditor. |
|
700 | 1 |
_aRay, Indrakshi. _eeditor. |
|
700 | 1 |
_aAlcaraz Calero, Jose M. _eeditor. |
|
700 | 1 |
_aThampi, Sabu M. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319491479 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v10066 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-49148-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c54432 _d54432 |