000 | 02732nam a22004935i 4500 | ||
---|---|---|---|
999 |
_c200434360 _d52572 |
||
003 | DE-He213 | ||
005 | 20231104114355.0 | ||
007 | cr nn 008mamaa | ||
008 | 150919s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319248585 _z978-3-319-24858-5 |
||
024 | 7 |
_a10.1007/978-3-319-24858-5 _2doi |
|
040 |
_aTR-AnTOB _beng _cTR-AnTOB _erda |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema005.8 _223 |
|
245 | 1 | 0 |
_aSecurity and Trust Management : _b11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / _cedited by Sara Foresti. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aSecurity and Cryptology ; _v9331 |
|
520 | _aThis book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aInformation Systems. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aComputer science. | |
650 | 1 | 4 |
_aSystems and Data Security. _0http://scigraph.springernature.com/things/product-market-codes/I28060 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0http://scigraph.springernature.com/things/product-market-codes/I24067 |
650 | 2 | 4 |
_aCryptology. _0http://scigraph.springernature.com/things/product-market-codes/I28020 |
650 | 2 | 4 |
_aAlgorithm Analysis and Problem Complexity. _0http://scigraph.springernature.com/things/product-market-codes/I16021 |
650 | 2 | 4 |
_aComputers and Society. _0http://scigraph.springernature.com/things/product-market-codes/I24040 |
700 | 1 |
_aForesti, Sara. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
856 | 4 | 0 |
_uhttps://doi.org/10.1007/978-3-319-24858-5 _3Springer eBooks _zOnline access link to the resource |
942 |
_2lcc _cEBK |
||
041 | _aeng |