feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • UB Potsdam  (1)
  • 2015-2019  (1)
  • 2016  (1)
  • Anwendungssystem  (1)
Type of Medium
Language
Region
Library
  • UB Potsdam  (1)
Years
  • 2015-2019  (1)
Year
Access
  • 1
    UID:
    gbv_1654787620
    Format: Online-Ressource (XV, 544 p. 134 illus, online resource)
    ISBN: 9783319498065
    Series Statement: Lecture Notes in Computer Science 10063
    Content: This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security
    Content: Attacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security
    Additional Edition: ISBN 9783319498058
    Additional Edition: Druckausg. ISBN 978-3-319-49805-8
    Additional Edition: Printed edition ISBN 9783319498058
    Language: English
    Keywords: Rechnernetz ; Informationssystem ; Privatsphäre ; Datensicherung ; Computersicherheit ; Zugriffskontrolle ; Authentifikation ; Kryptologie ; Verteiltes System ; Datensicherung ; Computersicherheit ; Informationssystem ; Authentifikation ; Zugriffskontrolle ; Anwendungssystem ; Kryptosystem
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages