000 | 03122nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-642-34601-9 | ||
003 | DE-He213 | ||
005 | 20240730194710.0 | ||
007 | cr nn 008mamaa | ||
008 | 121116s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642346019 _9978-3-642-34601-9 |
||
024 | 7 |
_a10.1007/978-3-642-34601-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aNetwork and System Security _h[electronic resource] : _b6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings / _cedited by Li Xu, Elisa Bertino, Yi Mu. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXIV, 532 p. 133 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7645 |
|
505 | 0 | _anetwork security -- system security -- public key cryptography -- privacy -- authentication -- security analysis.- access control. | |
520 | _aThis book constitutes the refereed proceedings of the 6 th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9157787 |
|
650 | 0 |
_aElectronic commerce. _95589 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9157788 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_ae-Commerce and e-Business. _931772 |
700 | 1 |
_aXu, Li. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157789 |
|
700 | 1 |
_aBertino, Elisa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157790 |
|
700 | 1 |
_aMu, Yi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157791 |
|
710 | 2 |
_aSpringerLink (Online service) _9157792 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642346002 |
776 | 0 | 8 |
_iPrinted edition: _z9783642346026 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7645 _9157793 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-34601-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95296 _d95296 |