Cantitate/Preț
Produs

Foundations and Practice of Security: 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers: Lecture Notes in Computer Science, cartea 9482

Editat de Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante
en Limba Engleză Paperback – 25 feb 2016
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Symposium on Foundationsand Practice of Security, FPS 2015, held in Clermont-Ferrand, France, inOctober 2015.
The 12 revised full papers presented together with 8short papers and 2 keynote talks were carefully reviewed and selected from 58submissions. The papers are organized in topical sections on RFID, sensors andsecure computation; security policies and biometrics; evaluation of protocolsand obfuscation security; spam emails, botnets and malware.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 38263 lei

Nou

Puncte Express: 574

Preț estimativ în valută:
7323 7606$ 6083£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319303024
ISBN-10: 3319303023
Pagini: 323
Ilustrații: XII, 323 p. 51 illus. in color.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.47 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

RFID, sensors and secure computation.- Securitypolicies and biometrics.- Evaluation of protocols and obfuscation security.- Spamemails, botnets and malware.

Textul de pe ultima copertă

This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Symposium on Foundationsand Practice of Security, FPS 2015, held in Clermont-Ferrand, France, inOctober 2015.
The 12 revised full papers presented together with 8short papers and 2 keynote talks were carefully reviewed and selected from 58submissions. The papers are organized in topical sections on RFID, sensors andsecure computation; security policies and biometrics; evaluation of protocolsand obfuscation security; spam emails, botnets and malware.

Caracteristici

Includes supplementary material: sn.pub/extras