000745350 000__ 02825cam\a2200565Mi\4500 000745350 001__ 745350 000745350 005__ 20230306141303.0 000745350 006__ m\\\\\o\\d\\\\\\\\ 000745350 007__ cr\nn\nnnunnun 000745350 008__ 151009s2015\\\\gw\a\\\\od\\\\100\0\eng\d 000745350 020__ $$a9783319241777$$qelectronic book 000745350 020__ $$a331924177X$$qelectronic book 000745350 020__ $$z9783319241760 000745350 0247_ $$a10.1007/978-3-319-24177-7$$2doi 000745350 035__ $$aSP(OCoLC)ocn932169235 000745350 035__ $$aSP(OCoLC)932169235 000745350 040__ $$aNUI$$beng$$cNUI$$dOCLCO$$dYDXCP$$dORU$$dOCLCF$$dGW5XE$$dOCLCO 000745350 049__ $$aISEA 000745350 050_4 $$aQA76.9.A25 000745350 08204 $$a005.8$$223 000745350 1112_ $$aEuropean Symposium on Research in Computer Security$$n(20th :$$d2015 :$$cVienna, Austria) 000745350 24510 $$aComputer Security -- ESORICS 2015$$h[electronic resource] :$$b20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings.$$nPart II /$$cGünther Pernul, Peter Y A Ryan, Edgar Weippl (eds.). 000745350 2463_ $$aESORICS 2015 000745350 264_1 $$aCham :$$bSpringer,$$c2015. 000745350 300__ $$a1 online resource (xvii, 665 pages) :$$billustrations 000745350 336__ $$atext$$btxt$$2rdacontent 000745350 337__ $$acomputer$$bc$$2rdamedia 000745350 338__ $$aonline resource$$bcr$$2rdacarrier 000745350 347__ $$atext file$$bPDF$$2rda 000745350 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9327 000745350 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000745350 506__ $$aAccess limited to authorized users. 000745350 520__ $$aThe two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security. 000745350 650_0 $$aComputer security$$vCongresses. 000745350 650_0 $$aComputer science. 000745350 650_0 $$aComputer security. 000745350 650_0 $$aData encryption (Computer science) 000745350 650_0 $$aAlgorithms. 000745350 650_0 $$aComputers and civilization. 000745350 650_0 $$aManagement information systems. 000745350 7001_ $$aPernul, Günther,$$d1961-$$eeditor. 000745350 7001_ $$aRyan, Peter Y. A.,$$eeditor. 000745350 7001_ $$aWeippl, Edgar R.,$$eeditor. 000745350 77608 $$iPrint version:$$z9783319241760 000745350 830_0 $$aLecture notes in computer science ;$$v9327. 000745350 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000745350 85280 $$bebk$$hSpringerLink 000745350 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-24177-7$$zOnline Access$$91397441.1 000745350 909CO $$ooai:library.usi.edu:745350$$pGLOBAL_SET 000745350 980__ $$aEBOOK 000745350 980__ $$aBIB 000745350 982__ $$aEbook 000745350 983__ $$aOnline 000745350 994__ $$a92$$bISE