Foundations and practice of security [electronic resource] : 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015. Revised selected papers / Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (eds.).
2016
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Foundations and practice of security [electronic resource] : 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015. Revised selected papers / Joaquin Garcia-Alfaro, Evangelos Kranakis, Guillaume Bonfante (eds.).
ISBN
9783319303031 (electronic book)
3319303031 (electronic book)
9783319303024
3319303031 (electronic book)
9783319303024
Published
Switzerland : Springer, 2016.
Language
English
Description
1 online resource (xii, 323 pages) : illustrations.
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/2
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Foundations and Practice of Security, FPS 2015, held in Clermont-Ferrand, France, in October 2015. The 12 revised full papers presented together with 8 short papers and 2 keynote talks were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on RFID, sensors and secure computation; security policies and biometrics; evaluation of protocols and obfuscation security; spam emails, botnets and malware.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed April 4, 2016).
Added Author
Garcia-Alfaro, Joaquin, editor.
Kranakis, Evangelos, editor.
Bonfante, Guillaume, editor.
Kranakis, Evangelos, editor.
Bonfante, Guillaume, editor.
Series
Lecture notes in computer science ; 9482.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
RFID, sensors and secure computation
Security policies and biometrics
Evaluation of protocols and obfuscation security
Spam emails, botnets and malware.
Security policies and biometrics
Evaluation of protocols and obfuscation security
Spam emails, botnets and malware.