Descripción del título
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.\00A0 The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on\00A0invited speeches;\00A0cryptograph;\00A0evaluation, standards and protocols;\00A0trust computing and privacy protection;\00A0cloud security and applications;\00A0tools and methodologies;\00A0system design and implementations
Monografía
monografia Rebiun16045813 https://catalogo.rebiun.org/rebiun/record/Rebiun16045813 cr nn 008mamaa 151107s2015 gw | s |||| 0|eng d 9783662486832 978-3-662-48683-2 10.1007/978-3-662-48683-2 doi UPVA 996890891303706 UAM 991007634643304211 UR bicssc UTN bicssc COM053000 bisacsh 005.8 23 Applications and Techniques in Information Security Recurso electrónico-En línea] 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten 1st ed. 2015 Berlin, Heidelberg Springer Berlin Heidelberg Imprint: Springer 2015 Berlin, Heidelberg Berlin, Heidelberg Springer Berlin Heidelberg Imprint: Springer XVII, 398 p. 147 illus. in color. online resource XVII, 398 p. 147 illus. in color. Communications in Computer and Information Science 1865-0929 557 Computer Science (Springer-11645) Accesible sólo para usuarios de la UPV Recurso a texto completo This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.\00A0 The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on\00A0invited speeches;\00A0cryptograph;\00A0evaluation, standards and protocols;\00A0trust computing and privacy protection;\00A0cloud security and applications;\00A0tools and methodologies;\00A0system design and implementations Reproducción electrónica Forma de acceso: Web Springer. Suscripción Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Niu, Wenjia. editor Li, Gang. editor Liu, Jiqiang. editor Tan, Jianlong. editor Guo, Li. editor Han, Zhen. editor Batten, Lynn. editor SpringerLink (Servicio en línea) Springer eBooks Springer eBooks Printed edition 9783662486825 Communications in Computer and Information Science 1865-0929 557