000 | 02900nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-642-32805-3 | ||
003 | DE-He213 | ||
005 | 20160624102216.0 | ||
007 | cr nn 008mamaa | ||
008 | 120905s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642328053 _9978-3-642-32805-3 |
||
024 | 7 |
_a10.1007/978-3-642-32805-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCommunications and Multimedia Security _h[electronic resource] : _b13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings / _cedited by Bart Decker, David W. Chadwick. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aVIII, 239 p. 57 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7394 |
|
505 | 0 | _aImage and Handwriting Analysis -- Authentication and Performance -- Biometrics, Forensics and Watermarking -- Communications Security. | |
520 | _aThis book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aBiometrics. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aBiometrics. |
650 | 2 | 4 | _ae-Commerce/e-business. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
700 | 1 |
_aDecker, Bart. _eeditor. |
|
700 | 1 |
_aChadwick, David W. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642328046 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7394 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-32805-3 |
942 |
_2EBK10425 _cEBK |
||
999 |
_c39719 _d39719 |