Welcome to Central Library, SUST
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Security and Privacy in Communication Networks [electronic resource] : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / edited by Angelos D. Keromytis, Roberto Di Pietro.

Contributor(s): Material type: TextTextSeries: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; 106Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013Description: X, 369 p. 111 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642368837
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Crypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy.
In: Springer eBooksSummary: This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Crypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy.

This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy.

There are no comments on this title.

to post a comment.