000 | 03202nam a2200457 i 4500 | ||
---|---|---|---|
003 | OSt | ||
008 | 121205s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642352119 _9978-3-642-35211-9 |
||
040 |
_aUCA _cUCA |
||
100 | 1 | _aLei, Jingsheng. | |
245 | 1 | 0 |
_aNetwork Computing and Information Security _h[Recurso electrónico] : _bSecond International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings / _cedited by Jingsheng Lei, Fu Lee Wang, Mo Li, Yuan Luo. |
260 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
||
490 | 0 | 0 |
_aCommunications in Computer and Information Science ; _v345 |
505 | 0 | _aApplications of Cryptography -- Authentication and Non-repudiation -- Cloud Computing -- Communication and Information Systems -- Design and Analysis of Cryptographic Algorithms -- Information Hiding and Watermarking -- Intelligent Networked Systems -- Multimedia Computing and Intelligence -- Network and Wireless Network Security -- Network Communication -- Parallel and Distributed Systems -- Security Modeling and Architectures -- Sensor Network -- Signal and Information Processing -- Virtualization Techniques and Applications -- Wireless Network. | |
520 | _aThis book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. <br>The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network. | ||
506 | _aRestringido a usuarios de la UCA | ||
538 | _aModo de acceso: World Wide Web | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aComputer system performance. | |
650 | 0 | _aData protection. | |
650 | 0 | _aInformation systems. | |
650 | 0 | _aElectronic data processing. | |
650 | 0 | _aComputer Science. | |
650 | 0 | _aSystems and Data Security. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aComputing Methodologies. | |
650 | 0 | _aInformation Systems and Communication Service. | |
650 | 0 | _aSystem Performance and Evaluation. | |
700 | 1 | _aWang, Fu Lee. | |
700 | 1 | _aLi, Mo. | |
700 | 1 | _aLuo, Yuan. | |
740 | 0 | _aSpringerLink e-Books (Servicio en línea) | |
740 | 0 | _aSpringer e-books (Servicio en línea) | |
740 | 0 | _aCommunications in Computer and Information Science (Servicio en línea) | |
776 | 0 | 8 |
_iPrinted edition: _z9783642352102 |
856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-3-642-35211-9 _zTexto completo |
909 |
_binter _c- |
||
942 | _n0 | ||
998 |
_b0 _c130306 _de _ey _f- _g0 |
||
999 |
_c890127 _d890127 |