Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

Author:   Jaime Lloret Mauri ,  Sabu M. Thampi ,  Danda B. Rawat ,  Di Jin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2014 ed.
Volume:   467
ISBN:  

9783662449653


Pages:   442
Publication Date:   12 September 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.

Full Product Details

Author:   Jaime Lloret Mauri ,  Sabu M. Thampi ,  Danda B. Rawat ,  Di Jin
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2014 ed.
Volume:   467
Dimensions:   Width: 15.50cm , Height: 2.40cm , Length: 23.50cm
Weight:   6.905kg
ISBN:  

9783662449653


ISBN 10:   366244965
Pages:   442
Publication Date:   12 September 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Security and privacy in networked systems.- Authentication and access control systems.- Encryption and cryptography.- System and network security.- Work-in-progress.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List