000 | 02824nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-319-24858-5 | ||
003 | DE-He213 | ||
005 | 20240730164705.0 | ||
007 | cr nn 008mamaa | ||
008 | 150919s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319248585 _9978-3-319-24858-5 |
||
024 | 7 |
_a10.1007/978-3-319-24858-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity and Trust Management _h[electronic resource] : _b11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / _cedited by Sara Foresti. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aX, 293 p. 68 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9331 |
|
520 | _aThis book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic data processing _xManagement. _985661 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aForesti, Sara. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _985664 |
|
710 | 2 |
_aSpringerLink (Online service) _985665 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319248578 |
776 | 0 | 8 |
_iPrinted edition: _z9783319248592 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9331 _985667 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-24858-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c85839 _d85839 |