Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/794
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHancke, Gerhard P. ;en_US
dc.contributor.authorDamiani, Ernesto. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:10Z-
dc.date.available2020-05-17T08:22:10Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319935249 ;en_US
dc.identifier.isbn9783319935232 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/794-
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9783319935232. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. ;en_US
dc.description.statementofresponsibilityedited by Gerhard P. Hancke, Ernesto Damiani.en_US
dc.format.extentXII, 189 p. 56 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ;en_US
dc.relation.haspart9783319935232.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectSpecial Purpose Computersen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectInformation Systems Applicationsen_US
dc.subjectSpecial Purpose and Application-Based Systems. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectData Encryption. ;en_US
dc.titleInformation Security Theory and Practiceen_US
dc.title.alternative11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28ee29, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319935232.pdf10.51 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHancke, Gerhard P. ;en_US
dc.contributor.authorDamiani, Ernesto. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:10Z-
dc.date.available2020-05-17T08:22:10Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319935249 ;en_US
dc.identifier.isbn9783319935232 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/794-
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9783319935232. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. ;en_US
dc.description.statementofresponsibilityedited by Gerhard P. Hancke, Ernesto Damiani.en_US
dc.format.extentXII, 189 p. 56 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ;en_US
dc.relation.haspart9783319935232.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectSpecial Purpose Computersen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectInformation Systems Applicationsen_US
dc.subjectSpecial Purpose and Application-Based Systems. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectData Encryption. ;en_US
dc.titleInformation Security Theory and Practiceen_US
dc.title.alternative11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28ee29, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319935232.pdf10.51 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHancke, Gerhard P. ;en_US
dc.contributor.authorDamiani, Ernesto. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:10Z-
dc.date.available2020-05-17T08:22:10Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319935249 ;en_US
dc.identifier.isbn9783319935232 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/794-
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; 9783319935232. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. ;en_US
dc.description.statementofresponsibilityedited by Gerhard P. Hancke, Ernesto Damiani.en_US
dc.format.extentXII, 189 p. 56 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10741. ;en_US
dc.relation.haspart9783319935232.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectSpecial Purpose Computersen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectInformation Systems Applicationsen_US
dc.subjectSpecial Purpose and Application-Based Systems. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectData Encryption. ;en_US
dc.titleInformation Security Theory and Practiceen_US
dc.title.alternative11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28ee29, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319935232.pdf10.51 MBAdobe PDFThumbnail
Preview File