Security Engineering and Intelligence Informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework...
Enregistré dans:
Auteurs principaux : | , , , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Security Engineering and Intelligence Informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings / edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Information Systems and Applications, incl. Internet/Web, and HCI ; 8128 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Security Engineering and Intelligence Informatics Autre format: Security Engineering and Intelligence Informatics |
LEADER | 04687clm a2200733 4500 | ||
---|---|---|---|
001 | PPN172429714 | ||
003 | http://www.sudoc.fr/172429714 | ||
005 | 20241001155400.0 | ||
010 | |a 978-3-642-40588-4 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-40588-4 |2 DOI |
035 | |a (OCoLC)868866004 | ||
035 | |a Springer978-3-642-40588-4 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-40588-4 | ||
035 | |a Springer-11645-978-3-642-40588-4 | ||
100 | |a 20131018d2013 u |0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Security Engineering and Intelligence Informatics |e CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings |f edited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Information Systems and Applications, incl |i Internet/Web, and HCI |x 2946-1642 |v 8128 | |
330 | |a This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense. | ||
359 | 1 | |a Symmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software and hardware implementation of cryptographic algorithms -- Database encryption -- Interaction between cryptographic theory and implementation issues -- Cyber security and dependability -- Network security and privacy -- Multimedia technology for homeland defense. | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Information Systems and Applications, incl. Internet/Web, and HCI |x 2946-1642 |v 8128 | |
452 | | | |t Security Engineering and Intelligence Informatics |b Texte imprimé |y 9783642405891 | |
452 | | | |t Security Engineering and Intelligence Informatics |b Texte imprimé |y 9783642405877 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Artificial Intelligence (incl. Robotics) | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Information Systems Applications (incl. Internet) | |
610 | 2 | |a Algorithm Analysis and Problem Complexity | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Information Storage and Retrieval | |
610 | 2 | |a Artificial Intelligence. | |
610 | 2 | |a Cryptology. | |
610 | 2 | |a Computer and Information Systems Applications | |
610 | 2 | |a Algorithms | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 004.6 |v 23 | ||
680 | |a TK5105.5-5105.9 | ||
700 | 1 | |3 PPN156264145 |a Cuzzocrea |b Alfredo |f 1974-.... |4 651 | |
701 | 1 | |a Kittl |b Christian |4 651 | |
701 | 1 | |a Simos |b Dimitris E. |4 651 | |
701 | 1 | |a Weippl |b Edgar |4 651 | |
701 | 1 | |a Xu |b Lida |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20231204 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-40588-4 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-LS1ZLCHZ-0 |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830861548 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-40588-4 | |
915 | |5 441099901:830861548 |b SPRING13-01129 | ||
930 | |5 441099901:830861548 |b 441099901 |j g | ||
991 | |5 441099901:830861548 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:16 | ||
997 | |a NUM |b SPRING13-01129 |d NUMpivo |e EM |s d | ||
998 | |a 978974 |