|
|
|
|
LEADER |
02735nam a22005655i 4500 |
001 |
10387 |
003 |
DE-He213 |
005 |
20130725194608.0 |
007 |
cr nn 008mamaa |
008 |
100301s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642115264
|9 978-3-642-11526-4
|
024 |
7 |
# |
|a 10.1007/978-3-642-11526-4
|2 doi
|
050 |
# |
4 |
|a TK5105.5-5105.9
|
072 |
# |
7 |
|a UKN
|2 bicssc
|
072 |
# |
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
# |
|a Gu, Qijun.
|e editor.
|
245 |
1 |
0 |
|a Security in Emerging Wireless Communication and Networking Systems
|b First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /
|c edited by Qijun Gu, Wanyu Zang, Meng Yu.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|v 42
|x 1867-8211 ;
|
520 |
# |
# |
|a This book constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September 2009. The workshop emphasizes on new ideas for secure architectures and protocols to enhance the emerging wireless systems. The 7 selected full papers cover topics on applied cryptography, key management, vulnerability analysis, privacy, authentication, and intrusion detection for emerging wireless systems.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer network architectures.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data structures (Computer science).
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Coding theory.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
# |
|a Zang, Wanyu.
|e editor.
|
700 |
1 |
# |
|a Yu, Meng.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642115257
|
830 |
# |
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|v 42
|x 1867-8211 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-11526-4
|
912 |
# |
# |
|a ZDB-2-SCS
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|