Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/781
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lin, Xiaodong. ; | en_US |
dc.contributor.author | Ghorbani, Ali. ; | en_US |
dc.contributor.author | Ren, Kui. ; | en_US |
dc.contributor.author | Zhu, Sencun. ; | en_US |
dc.contributor.author | Zhang, Aiqing. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:00Z | - |
dc.date.available | 2020-05-17T08:22:00Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319788166 ; | en_US |
dc.identifier.isbn | 9783319788159 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/781 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319788159. ; | en_US |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. ; | en_US |
dc.description.statementofresponsibility | edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang. | en_US |
dc.description.tableofcontents | Access control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. ; | en_US |
dc.format.extent | XI, 339 p. 104 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; ; 239. ; | en_US |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; | en_US |
dc.relation.haspart | 9783319788166.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Security. ; | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.title | Security and Privacy in Communication Networks | en_US |
dc.title.alternative | SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22ee25, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319788166.pdf | 23.23 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lin, Xiaodong. ; | en_US |
dc.contributor.author | Ghorbani, Ali. ; | en_US |
dc.contributor.author | Ren, Kui. ; | en_US |
dc.contributor.author | Zhu, Sencun. ; | en_US |
dc.contributor.author | Zhang, Aiqing. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:00Z | - |
dc.date.available | 2020-05-17T08:22:00Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319788166 ; | en_US |
dc.identifier.isbn | 9783319788159 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/781 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319788159. ; | en_US |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. ; | en_US |
dc.description.statementofresponsibility | edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang. | en_US |
dc.description.tableofcontents | Access control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. ; | en_US |
dc.format.extent | XI, 339 p. 104 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; ; 239. ; | en_US |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; | en_US |
dc.relation.haspart | 9783319788166.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Security. ; | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.title | Security and Privacy in Communication Networks | en_US |
dc.title.alternative | SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22ee25, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319788166.pdf | 23.23 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lin, Xiaodong. ; | en_US |
dc.contributor.author | Ghorbani, Ali. ; | en_US |
dc.contributor.author | Ren, Kui. ; | en_US |
dc.contributor.author | Zhu, Sencun. ; | en_US |
dc.contributor.author | Zhang, Aiqing. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:00Z | - |
dc.date.available | 2020-05-17T08:22:00Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319788166 ; | en_US |
dc.identifier.isbn | 9783319788159 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/781 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319788159. ; | en_US |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures. ; | en_US |
dc.description.statementofresponsibility | edited by Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang. | en_US |
dc.description.tableofcontents | Access control -- Language-based security -- Malicious software -- Network security -- Cloud security -- Software security -- Operating system security -- Privacy protection -- Database security -- Security models -- Novel models -- Techniques -- Protocols -- Algorithms -- Architectures. ; | en_US |
dc.format.extent | XI, 339 p. 104 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; ; 239. ; | en_US |
dc.relation.ispartofseries | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, ; 1867-8211 ; | en_US |
dc.relation.haspart | 9783319788166.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Security. ; | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.title | Security and Privacy in Communication Networks | en_US |
dc.title.alternative | SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22ee25, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319788166.pdf | 23.23 MB | Adobe PDF | Preview File |