Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings

This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Askoxylakis Ioannis (Directeur de publication), Pöhls Henrich C. (Directeur de publication), Posegga Joachim (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems : 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings / edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2012
Cham : Springer Nature
Collection : Security and Cryptology ; 7322
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Sujets :
Documents associés : Autre format: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
Autre format: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
LEADER 03504clm a2200673 4500
001 PPN168318083
003 http://www.sudoc.fr/168318083
005 20241001155000.0
010 |a 978-3-642-30955-7 
017 7 0 |a 10.1007/978-3-642-30955-7  |2 DOI 
035 |a (OCoLC)812960950 
035 |a Springer978-3-642-30955-7 
035 |a Springer-11645-978-3-642-30955-7 
100 |a 20130325d2012 k |0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
105 |a y z 100yy 
106 |a s 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems  |e 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings  |f edited by Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2012 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7322 
330 |a This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security. 
371 0 |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition 
410 | |t Security and Cryptology  |x 2946-1863  |v 7322 
452 | |t Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems  |y 9783642309540 
452 | |t Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems  |b Texte imprimé  |y 9783642309564 
608 |3 PPN02886431X  |a Actes de congrès  |2 rameau 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Data Structures, Cryptology and Information Theory 
610 2 |a Management of Computing and Information Systems 
610 2 |a Systems and Data Security 
610 2 |a Computer Communication Networks 
610 2 |a Computers and Society 
610 2 |a Cryptology. 
610 2 |a Data Structures and Information Theory. 
610 2 |a Data and Information Security 
610 2 |a IT Operations 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 004.6  |v 23 
680 |a TK5105.5-5105.9 
700 1 |a Askoxylakis  |b Ioannis  |4 651 
701 1 |a Pöhls  |b Henrich C.  |4 651 
701 1 |3 PPN235138312  |a Posegga  |b Joachim  |4 651 
801 3 |a FR  |b Abes  |c 20231204  |g AFNOR 
801 1 |a DE  |b Springer  |c 20231204  |g AACR2 
856 4 |5 441099901:830852123  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-30955-7 
915 |5 441099901:830852123  |b SPRING13-00299 
930 |5 441099901:830852123  |b 441099901  |j g 
991 |5 441099901:830852123  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:10 
997 |a NUM  |b SPRING13-00299  |d NUMpivo  |e EM  |s d 
998 |a 978133