Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and...
Enregistré dans:
Auteurs principaux : | , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings / edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2012 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7322 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Sujets : | |
Documents associés : | Autre format:
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems Autre format: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems |
LEADER | 03504clm a2200673 4500 | ||
---|---|---|---|
001 | PPN168318083 | ||
003 | http://www.sudoc.fr/168318083 | ||
005 | 20241001155000.0 | ||
010 | |a 978-3-642-30955-7 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-30955-7 |2 DOI |
035 | |a (OCoLC)812960950 | ||
035 | |a Springer978-3-642-30955-7 | ||
035 | |a Springer-11645-978-3-642-30955-7 | ||
100 | |a 20130325d2012 k |0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
105 | |a y z 100yy | ||
106 | |a s | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems |e 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings |f edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2012 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7322 | |
330 | |a This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security. | ||
371 | 0 | |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7322 | |
452 | | | |t Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems |y 9783642309540 | |
452 | | | |t Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems |b Texte imprimé |y 9783642309564 | |
608 | |3 PPN02886431X |a Actes de congrès |2 rameau | ||
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Data Structures, Cryptology and Information Theory | |
610 | 2 | |a Management of Computing and Information Systems | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Computers and Society | |
610 | 2 | |a Cryptology. | |
610 | 2 | |a Data Structures and Information Theory. | |
610 | 2 | |a Data and Information Security | |
610 | 2 | |a IT Operations | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 004.6 |v 23 | ||
680 | |a TK5105.5-5105.9 | ||
700 | 1 | |a Askoxylakis |b Ioannis |4 651 | |
701 | 1 | |a Pöhls |b Henrich C. |4 651 | |
701 | 1 | |3 PPN235138312 |a Posegga |b Joachim |4 651 | |
801 | 3 | |a FR |b Abes |c 20231204 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20231204 |g AACR2 | |
856 | 4 | |5 441099901:830852123 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-30955-7 | |
915 | |5 441099901:830852123 |b SPRING13-00299 | ||
930 | |5 441099901:830852123 |b 441099901 |j g | ||
991 | |5 441099901:830852123 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:10 | ||
997 | |a NUM |b SPRING13-00299 |d NUMpivo |e EM |s d | ||
998 | |a 978133 |