Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/781
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Xiaodong. ;en_US
dc.contributor.authorGhorbani, Ali. ;en_US
dc.contributor.authorRen, Kui. ;en_US
dc.contributor.authorZhu, Sencun. ;en_US
dc.contributor.authorZhang, Aiqing. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:00Z-
dc.date.available2020-05-17T08:22:00Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319788166 ;en_US
dc.identifier.isbn9783319788159 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/781-
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319788159. ;en_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. ;en_US
dc.description.statementofresponsibilityedited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang.en_US
dc.description.tableofcontentsAccess control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. ;en_US
dc.format.extentXI, 339 p. 104 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; ; 239. ;en_US
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ;en_US
dc.relation.haspart9783319788166.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectData Encryption. ;en_US
dc.subjectComputer Communication Networksen_US
dc.titleSecurity and Privacy in Communication Networksen_US
dc.title.alternativeSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22ee25, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319788166.pdf23.23 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Xiaodong. ;en_US
dc.contributor.authorGhorbani, Ali. ;en_US
dc.contributor.authorRen, Kui. ;en_US
dc.contributor.authorZhu, Sencun. ;en_US
dc.contributor.authorZhang, Aiqing. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:00Z-
dc.date.available2020-05-17T08:22:00Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319788166 ;en_US
dc.identifier.isbn9783319788159 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/781-
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319788159. ;en_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. ;en_US
dc.description.statementofresponsibilityedited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang.en_US
dc.description.tableofcontentsAccess control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. ;en_US
dc.format.extentXI, 339 p. 104 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; ; 239. ;en_US
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ;en_US
dc.relation.haspart9783319788166.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectData Encryption. ;en_US
dc.subjectComputer Communication Networksen_US
dc.titleSecurity and Privacy in Communication Networksen_US
dc.title.alternativeSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22ee25, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319788166.pdf23.23 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Xiaodong. ;en_US
dc.contributor.authorGhorbani, Ali. ;en_US
dc.contributor.authorRen, Kui. ;en_US
dc.contributor.authorZhu, Sencun. ;en_US
dc.contributor.authorZhang, Aiqing. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:00Z-
dc.date.available2020-05-17T08:22:00Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319788166 ;en_US
dc.identifier.isbn9783319788159 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/781-
dc.description005.8 ; 23 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319788159. ;en_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. ;en_US
dc.description.statementofresponsibilityedited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang.en_US
dc.description.tableofcontentsAccess control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. ;en_US
dc.format.extentXI, 339 p. 104 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; ; 239. ;en_US
dc.relation.ispartofseriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ;en_US
dc.relation.haspart9783319788166.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectSecurity. ;en_US
dc.subjectData Encryption. ;en_US
dc.subjectComputer Communication Networksen_US
dc.titleSecurity and Privacy in Communication Networksen_US
dc.title.alternativeSecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22ee25, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319788166.pdf23.23 MBAdobe PDFThumbnail
Preview File