000733625 000__ 02883cam\a2200541Ii\4500 000733625 001__ 733625 000733625 005__ 20230306141055.0 000733625 006__ m\\\\\o\\d\\\\\\\\ 000733625 007__ cr\cn\nnnunnun 000733625 008__ 150814s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000733625 020__ $$a9783319229157$$qelectronic book 000733625 020__ $$a331922915X$$qelectronic book 000733625 020__ $$z9783319229140 000733625 0247_ $$a10.1007/978-3-319-22915-7$$2doi 000733625 035__ $$aSP(OCoLC)ocn918568191 000733625 035__ $$aSP(OCoLC)918568191 000733625 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dSNK$$dUPM$$dCOO$$dOCLCF$$dOCLCO 000733625 049__ $$aISEA 000733625 050_4 $$aQA76.9.A25 000733625 08204 $$a005.8$$223 000733625 1112_ $$aSSCC (Conference)$$n(3rd :$$d2015 :$$cCochin, India) 000733625 24510 $$aSecurity in computing and communications$$h[electronic resource] :$$bthird international symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings /$$cJemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez (eds.). 000733625 2463_ $$aSSCC 2015 000733625 264_1 $$aCham :$$bSpringer,$$c2015. 000733625 300__ $$a1 online resource (xxi, 548 pages) :$$billustrations. 000733625 336__ $$atext$$btxt$$2rdacontent 000733625 337__ $$acomputer$$bc$$2rdamedia 000733625 338__ $$aonline resource$$bcr$$2rdacarrier 000733625 4901_ $$aCommunications in computer and information science,$$x1865-0929 ;$$v536 000733625 500__ $$aInternational conference proceedings. 000733625 500__ $$aIncludes author index. 000733625 5050_ $$aSecurity in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security. 000733625 506__ $$aAccess limited to authorized users. 000733625 520__ $$aThis book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security. 000733625 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 14, 2015). 000733625 650_0 $$aComputer security$$vCongresses. 000733625 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000733625 650_0 $$aComputers$$xAccess control$$vCongresses. 000733625 7001_ $$aAbawajy, Jemal H.,$$d1982-$$eeditor. 000733625 7001_ $$aMukherjea, Sougata,$$eeditor. 000733625 7001_ $$aThampi, Sabu M.,$$eeditor. 000733625 7001_ $$aMartinez, Antonio Ruiz,$$d1976-$$eeditor. 000733625 77608 $$iPrint version:$$z9783319229140 000733625 830_0 $$aCommunications in computer and information science ;$$v536. 000733625 852__ $$bebk 000733625 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-22915-7$$zOnline Access$$91397441.1 000733625 909CO $$ooai:library.usi.edu:733625$$pGLOBAL_SET 000733625 980__ $$aEBOOK 000733625 980__ $$aBIB 000733625 982__ $$aEbook 000733625 983__ $$aOnline 000733625 994__ $$a92$$bISE