000754616 000__ 02792cam\a2200505Ii\4500 000754616 001__ 754616 000754616 005__ 20230306141717.0 000754616 006__ m\\\\\o\\d\\\\\\\\ 000754616 007__ cr\cn\nnnunnun 000754616 008__ 160407s2016\\\\sz\a\\\\o\\\\\101\0\eng\d 000754616 020__ $$a9783319318110$$q(electronic book) 000754616 020__ $$a331931811X$$q(electronic book) 000754616 020__ $$z9783319318103 000754616 0247_ $$a10.1007/978-3-319-31811-0$$2doi 000754616 035__ $$aSP(OCoLC)ocn946073289 000754616 035__ $$aSP(OCoLC)946073289 000754616 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dYDXCP$$dOCLCF$$dOCLCO$$dUPM 000754616 049__ $$aISEA 000754616 050_4 $$aTK5105.59 000754616 08204 $$a005.8$$223 000754616 1112_ $$aInternational Conference on Risks and Security of Internet and Systems$$n(10th :$$d2015 :$$cMytilēnē, Lesbos, Greece) 000754616 24510 $$aRisks and security of internet and systems$$h[electronic resource] :$$b10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised selected papers /$$cCostas Lambrinoudakis, Alban Gabillon (eds.). 000754616 2463_ $$aCRiSIS 2015 000754616 264_1 $$aSwitzerlands :$$bSpringer,$$c2016. 000754616 300__ $$a1 online resource (x, 307 pages) :$$billustrations. 000754616 336__ $$atext$$btxt$$2rdacontent 000754616 337__ $$acomputer$$bc$$2rdamedia 000754616 338__ $$aonline resource$$bcr$$2rdacarrier 000754616 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9572 000754616 4901_ $$aLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI 000754616 500__ $$aIncludes author index. 000754616 506__ $$aAccess limited to authorized users. 000754616 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures. 000754616 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 7, 2016). 000754616 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000754616 650_0 $$aInternet$$xSecurity measures$$vCongresses. 000754616 650_0 $$aComputer security$$vCongresses. 000754616 7001_ $$aLambrinoudakis, Costas,$$eeditor. 000754616 7001_ $$aGabillon, Alban,$$eeditor. 000754616 830_0 $$aLecture notes in computer science ;$$v9572. 000754616 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 000754616 852__ $$bebk 000754616 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-31811-0$$zOnline Access$$91397441.1 000754616 909CO $$ooai:library.usi.edu:754616$$pGLOBAL_SET 000754616 980__ $$aEBOOK 000754616 980__ $$aBIB 000754616 982__ $$aEbook 000754616 983__ $$aOnline 000754616 994__ $$a92$$bISE