Security in computing and communications : International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings /
Salvato in:
| Ente Autore: | |
|---|---|
| Altri autori: | , , , |
| Natura: | eBook |
| Lingua: | English |
| Pubblicazione: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2013.
|
| Serie: | Communications in Computer and Information Science
377 |
| Soggetti: | |
| Accesso online: | Click here to view the full text content |
| Tags: |
Aggiungi Tag
Nessun Tag, puoi essere il primo ad aggiungerne! !
|
| LEADER | 02302nam a2200433 i 4500 | ||
|---|---|---|---|
| 001 | vtls000112506 | ||
| 003 | MY-ArUMP | ||
| 005 | 20210731152447.0 | ||
| 006 | m fo d | ||
| 007 | cr nn 008mamaa | ||
| 008 | 131031s2013 gw | fs |||| 0|eng d | ||
| 020 | |a 9783642405761 | ||
| 039 | 9 | |a 201412181149 |b RAR |c 201310311659 |d VLOAD |y 201310081731 |z NY | |
| 040 | |a MYPMP |b eng |c MYPMP |e rda | ||
| 245 | 0 | 0 | |a Security in computing and communications : |b International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings / |c edited by Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez. |
| 264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2013. | |
| 300 | |a 1 online resource (XVI, 404 pages) 149 illustrations. |b digital | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 347 | |a text file |b PDF |2 rda | ||
| 490 | 1 | |a Communications in Computer and Information Science |x 1865-0929 |v 377 | |
| 505 | 0 | |a A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded System -- Signature Embedding in the Functional Description of Reversible -- Circuit -- Detecting Laser Fault Injection for Smart Cards Using Security Automata -- Virtual World Authentication Using the Smart Card Web Server -- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart Cards -- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value Decomposition. | |
| 650 | 0 | |a Computer science. | |
| 650 | 0 | |a Computer Communication Networks. | |
| 650 | 0 | |a Data protection. | |
| 700 | 1 | |a Atrey, Pradeep K. | |
| 700 | 1 | |a Fan, Chun-I. | |
| 700 | 1 | |a Perez, Gregorio Martinez. | |
| 700 | 1 | |a Thampi, Sabu M. | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer eBooks | |
| 776 | 0 | 8 | |i Printed edition: |z 9783642405754 |
| 830 | 0 | |a Communications in Computer and Information Science |x 1865-0929 |v 377 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-40576-1 |y Click here to view the full text content |
| 942 | |2 lcc |c BK-EBOOK | ||
| 949 | |a VIRTUAITEM |d 10011 |x 9 | ||
| 999 | |c 53908 |d 53908 | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |7 0 |9 49219 |a FSGM |b FSGM |d 2021-07-31 |l 0 |r 2021-07-31 |w 2021-07-31 |y BK-EBOOK | ||