This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and…mehr
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engi 12
Security & amp; Privacy in Mobile, Sensor and Ad Hoc Networks.- Malware, Botnets and Distributed Denial of Service.- Security for Emerging Technologies: VoIP, Peer-to-peer and Cloud Computing.- Encryption and Key Management.- Security in Software and Machine Learning.- Network and System Security Model.- Security and Privacy in Pervasive and Ubiquitous Computing ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security.
Security & amp; Privacy in Mobile, Sensor and Ad Hoc Networks.- Malware, Botnets and Distributed Denial of Service.- Security for Emerging Technologies: VoIP, Peer-to-peer and Cloud Computing.- Encryption and Key Management.- Security in Software and Machine Learning.- Network and System Security Model.- Security and Privacy in Pervasive and Ubiquitous Computing ATIS 2013: 4th International Workshop on Applications and Techniques in Information Security.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497