Open Research Problems in Network Security [electronic resource] : IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers / edited by Jan Camenisch, Valentin Kisimov, Maria Dubovitskaya.
Contributor(s): Camenisch, Jan [editor.] | Kisimov, Valentin [editor.] | Dubovitskaya, Maria [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 6555Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: VIII, 172 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642192289.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computer networks | Computers and civilization | Application software | Data and Information Security | Cryptology | IT Operations | Computer Communication Networks | Computers and Society | Computer and Information Systems ApplicationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.No physical items for this record
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.
There are no comments for this item.