Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing t...
Enregistré dans:
Auteurs principaux : | , , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Communications and Multimedia Security : 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings / edited by Bart Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 8099 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Communications and Multimedia Security Autre format: Communications and Multimedia Security |
LEADER | 03970clm a2200757 4500 | ||
---|---|---|---|
001 | PPN172429978 | ||
003 | http://www.sudoc.fr/172429978 | ||
005 | 20241001155400.0 | ||
010 | |a 978-3-642-40779-6 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-40779-6 |2 DOI |
035 | |a (OCoLC)868125998 | ||
035 | |a Springer978-3-642-40779-6 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-40779-6 | ||
035 | |a Springer-11645-978-3-642-40779-6 | ||
100 | |a 20131018d2013 k |0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
105 | |a y z 100yy | ||
106 | |a s | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Communications and Multimedia Security |e 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings |f edited by Bart Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 8099 | |
330 | |a This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication. | ||
359 | 1 | |a Biometrics -- Applied cryptography -- Digital watermarking -- Steganography and forensics.- Social network privacy -- Security and authentication. | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 8099 | |
452 | | | |t Communications and Multimedia Security |y 9783642407789 | |
452 | | | |t Communications and Multimedia Security |b Texte imprimé |y 9783642407802 | |
608 | |3 PPN02886431X |a Actes de congrès |2 rameau | ||
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a e-Commerce |a e-business | |
610 | 2 | |a Management of Computing and Information Systems | |
610 | 2 | |a Biometrics | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Cryptology. | |
610 | 2 | |a e-Commerce and e-Business | |
610 | 1 | |a Data and Information Security | |
610 | 2 | |a IT Operations | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.8 |v 23 | ||
680 | |a QA76.9.A25 | ||
700 | 1 | |a Decker |b Bart |4 651 | |
701 | 1 | |a Dittmann |b Jana |4 651 | |
701 | 1 | |a Kraetzer |b Christian |4 651 | |
701 | 1 | |3 PPN112994377 |a Vielhauer |b Claus |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20231204 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-40779-6 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-8VFXNGKB-S |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830861777 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-40779-6 | |
915 | |5 441099901:830861777 |b SPRING13-01150 | ||
930 | |5 441099901:830861777 |b 441099901 |j g | ||
991 | |5 441099901:830861777 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:17 | ||
997 | |a NUM |b SPRING13-01150 |d NUMpivo |e EM |s d | ||
998 | |a 978994 |