Security and Privacy in Communication Networks [electronic resource] : 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers / edited by Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis.
Tipo de material: TextoSeries Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 96 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 96Editor: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Descripción: XIV, 548 p. 174 illus. online resourceTipo de contenido:- text
- computer
- online resource
- 9783642319099
- SpringerLink (Online service)
- Computer science
- Computer Communication Networks
- Operating systems (Computers)
- Data protection
- Data encryption (Computer science)
- Information Systems
- Computer Science
- Systems and Data Security
- Management of Computing and Information Systems
- Computer Communication Networks
- Data Encryption
- Information Systems Applications (incl. Internet)
- Operating Systems
- 005.8 23
- Libro electrónico
Contenidos:
Springer eBooksResumen: This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
No hay ítems correspondientes a este registro
network intrusion detection -- anonymity and privacy -- wireless security -- system security -- DNS and routing secuity -- key management.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
ZDB-2-SCS
No hay comentarios en este titulo.
Ingresar a su cuenta para colocar un comentario.