000726459 000__ 02924cam\a2200529Ii\4500 000726459 001__ 726459 000726459 005__ 20230306140822.0 000726459 006__ m\\\\\o\\d\\\\\\\\ 000726459 007__ cr\cn\nnnunnun 000726459 008__ 150409s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000726459 020__ $$a9783319170404$$qelectronic book 000726459 020__ $$a3319170406$$qelectronic book 000726459 020__ $$z9783319170398 000726459 0247_ $$a10.1007/978-3-319-17040-4$$2doi 000726459 035__ $$aSP(OCoLC)ocn906938143 000726459 035__ $$aSP(OCoLC)906938143 000726459 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dBTCTA$$dYDXCP$$dUPM$$dOCLCF$$dOCLCO$$dVLB 000726459 049__ $$aISEA 000726459 050_4 $$aQA76.9.A25$$bF67 2015eb 000726459 08204 $$a005.8/2$$223 000726459 1112_ $$aFPS (Symposium)$$n(7th :$$d2014 :$$cMontréal, Québec) 000726459 24510 $$aFoundations and practice of security$$h[electronic resource] :$$b7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised selected papers /$$cFrédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood, Philip W. L. Fong (eds.) 000726459 2463_ $$aFPS 2014 000726459 264_1 $$aCham :$$bSpringer,$$c2015. 000726459 300__ $$a1 online resource (xiii, 375 pages) :$$billustrations. 000726459 336__ $$atext$$btxt$$2rdacontent 000726459 337__ $$acomputer$$bc$$2rdamedia 000726459 338__ $$aonline resource$$bcr$$2rdacarrier 000726459 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v8930 000726459 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000726459 500__ $$aIncludes author index. 000726459 5050_ $$aPrivacy -- Software security and malware analysis -- Network security and protocols -- Access control models and policy analysis -- Protocol verification -- Cryptographic technologies. 000726459 506__ $$aAccess limited to authorized users. 000726459 520__ $$aThis book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies. 000726459 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 9, 2015). 000726459 650_0 $$aComputer security$$vCongresses. 000726459 650_0 $$aData encryption (Computer science)$$vCongresses. 000726459 7001_ $$aCuppens, Frédéric,$$eeditor. 000726459 7001_ $$aGarcia-Alfaro, Joaquin,$$eeditor. 000726459 7001_ $$aZincir Heywood, Nur,$$eeditor. 000726459 7001_ $$aFong, Philip W. L.,$$eeditor. 000726459 830_0 $$aLecture notes in computer science ;$$v8930. 000726459 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000726459 852__ $$bebk 000726459 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-17040-4$$zOnline Access$$91397441.1 000726459 909CO $$ooai:library.usi.edu:726459$$pGLOBAL_SET 000726459 980__ $$aEBOOK 000726459 980__ $$aBIB 000726459 982__ $$aEbook 000726459 983__ $$aOnline 000726459 994__ $$a92$$bISE