000754529 000__ 02778cam\a2200505Ii\4500 000754529 001__ 754529 000754529 005__ 20230306141712.0 000754529 006__ m\\\\\o\\d\\\\\\\\ 000754529 007__ cr\cn\nnnunnun 000754529 008__ 160404s2016\\\\sz\a\\\\o\\\\\101\0\eng\d 000754529 020__ $$a9783319303031$$q(electronic book) 000754529 020__ $$a3319303031$$q(electronic book) 000754529 020__ $$z9783319303024 000754529 035__ $$aSP(OCoLC)ocn945925013 000754529 035__ $$aSP(OCoLC)945925013 000754529 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dNUI 000754529 049__ $$aISEA 000754529 050_4 $$aQA76.9.A25 000754529 08204 $$a005.8/2$$223 000754529 1112_ $$aFPS (Symposium)$$n(8th :$$d2015 :$$cClermont-Ferrand, France) 000754529 24510 $$aFoundations and practice of security$$h[electronic resource] :$$b8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015. Revised selected papers /$$cJoaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (eds.). 000754529 2463_ $$aFPS 2015 000754529 264_1 $$aSwitzerland :$$bSpringer,$$c2016. 000754529 300__ $$a1 online resource (xii, 323 pages) :$$billustrations. 000754529 336__ $$atext$$btxt$$2rdacontent 000754529 337__ $$acomputer$$bc$$2rdamedia 000754529 338__ $$aonline resource$$bcr$$2rdacarrier 000754529 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9482 000754529 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000754529 500__ $$aIncludes author index. 000754529 5050_ $$aRFID, sensors and secure computation -- Security policies and biometrics -- Evaluation of protocols and obfuscation security -- Spam emails, botnets and malware. 000754529 506__ $$aAccess limited to authorized users. 000754529 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware. 000754529 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 4, 2016). 000754529 650_0 $$aComputer security$$vCongresses. 000754529 650_0 $$aData encryption (Computer science)$$vCongresses. 000754529 7001_ $$aGarcia-Alfaro, Joaquin,$$eeditor. 000754529 7001_ $$aKranakis, Evangelos,$$eeditor. 000754529 7001_ $$aBonfante, Guillaume,$$eeditor. 000754529 830_0 $$aLecture notes in computer science ;$$v9482. 000754529 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000754529 852__ $$bebk 000754529 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-30303-1$$zOnline Access$$91397441.1 000754529 909CO $$ooai:library.usi.edu:754529$$pGLOBAL_SET 000754529 980__ $$aEBOOK 000754529 980__ $$aBIB 000754529 982__ $$aEbook 000754529 983__ $$aOnline 000754529 994__ $$a92$$bISE