|
|
|
|
LEADER |
02536nam a22005175i 4500 |
001 |
16430 |
003 |
DE-He213 |
005 |
20131009045057.0 |
007 |
cr nn 008mamaa |
008 |
131001s2013 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642414886
|9 978-3-642-41488-6
|
024 |
7 |
# |
|a 10.1007/978-3-642-41488-6
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a UR
|2 bicssc
|
072 |
# |
7 |
|a UTN
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
# |
|a Riis Nielson, Hanne.
|e editor.
|
245 |
1 |
0 |
|a Secure IT Systems
|b 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings /
|c edited by Hanne Riis Nielson, Dieter Gollmann.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2013.
|
300 |
# |
# |
|a XIV, 321 p. 64 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 8208
|x 0302-9743 ;
|
505 |
0 |
# |
|a Cyber-Physical Systems -- Security Policies -- Information Flow -- Security Experiences -- Cyber-Physical Systems -- Web Security -- Security Policies -- Network Security.
|
520 |
# |
# |
|a This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Computer software.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
# |
|a Gollmann, Dieter.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642414879
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 8208
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-41488-6
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|