Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/794
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hancke, Gerhard P. ; | en_US |
dc.contributor.author | Damiani, Ernesto. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:10Z | - |
dc.date.available | 2020-05-17T08:22:10Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319935249 ; | en_US |
dc.identifier.isbn | 9783319935232 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/794 | - |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | Printed edition: ; 9783319935232. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. ; | en_US |
dc.description.statementofresponsibility | edited by Gerhard P. Hancke, Ernesto Damiani. | en_US |
dc.format.extent | XII, 189 p. 56 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ; | en_US |
dc.relation.haspart | 9783319935232.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Special Purpose Computers | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Information Systems Applications | en_US |
dc.subject | Special Purpose and Application-Based Systems. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.title | Information Security Theory and Practice | en_US |
dc.title.alternative | 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28ee29, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319935232.pdf | 10.51 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hancke, Gerhard P. ; | en_US |
dc.contributor.author | Damiani, Ernesto. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:10Z | - |
dc.date.available | 2020-05-17T08:22:10Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319935249 ; | en_US |
dc.identifier.isbn | 9783319935232 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/794 | - |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | Printed edition: ; 9783319935232. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. ; | en_US |
dc.description.statementofresponsibility | edited by Gerhard P. Hancke, Ernesto Damiani. | en_US |
dc.format.extent | XII, 189 p. 56 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ; | en_US |
dc.relation.haspart | 9783319935232.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Special Purpose Computers | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Information Systems Applications | en_US |
dc.subject | Special Purpose and Application-Based Systems. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.title | Information Security Theory and Practice | en_US |
dc.title.alternative | 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28ee29, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319935232.pdf | 10.51 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hancke, Gerhard P. ; | en_US |
dc.contributor.author | Damiani, Ernesto. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:10Z | - |
dc.date.available | 2020-05-17T08:22:10Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319935249 ; | en_US |
dc.identifier.isbn | 9783319935232 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/794 | - |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | Printed edition: ; 9783319935232. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. ; | en_US |
dc.description.statementofresponsibility | edited by Gerhard P. Hancke, Ernesto Damiani. | en_US |
dc.format.extent | XII, 189 p. 56 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ; | en_US |
dc.relation.haspart | 9783319935232.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Communication Systems | en_US |
dc.subject | Special Purpose Computers | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Information Systems Applications | en_US |
dc.subject | Special Purpose and Application-Based Systems. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.title | Information Security Theory and Practice | en_US |
dc.title.alternative | 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28ee29, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319935232.pdf | 10.51 MB | Adobe PDF | Preview File |