| 000 | 02943nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-34135-9 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083329.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120910s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642341359 _9978-3-642-34135-9 |
||
| 024 | 7 |
_a10.1007/978-3-642-34135-9 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aUR _2bicssc |
|
| 072 | 7 |
_aUTN _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aThampi, Sabu M. _eeditor. |
|
| 245 | 1 | 0 |
_aRecent Trends in Computer Networks and Distributed Systems Security _h[electronic resource] : _bInternational Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings / _cedited by Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
| 300 |
_aXXI, 508 p. 207 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v335 |
|
| 505 | 0 | _aa novel key management mechanism for dynamic hierarchical access control based on linear polynomials -- performance evaluation of the fuzzy ARTMAPĀ for network intrusion detection -- ID-based threshold signcryption and group unsigncryption -- protocol for secure submissions into learning management systems. | |
| 520 | _aThis book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aCoding theory. | |
| 650 | 0 | _aComputer software. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aCoding and Information Theory. |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 700 | 1 |
_aZomaya, Albert Y. _eeditor. |
|
| 700 | 1 |
_aStrufe, Thorsten. _eeditor. |
|
| 700 | 1 |
_aAlcaraz Calero, Jose M. _eeditor. |
|
| 700 | 1 |
_aThomas, Tony. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642341342 |
| 830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v335 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-34135-9 |
| 912 | _aZDB-2-SCS | ||
| 999 |
_c103737 _d103737 |
||