000761379 000__ 03078cam\a2200529Ii\4500 000761379 001__ 761379 000761379 005__ 20230306142153.0 000761379 006__ m\\\\\o\\d\\\\\\\\ 000761379 007__ cr\cn\nnnunnun 000761379 008__ 160923s2016\\\\sz\a\\\\o\\\\\101\0\eng\d 000761379 019__ $$a961007339 000761379 020__ $$a9783319459318$$q(electronic book) 000761379 020__ $$a3319459317$$q(electronic book) 000761379 020__ $$z9783319459301 000761379 0247_ $$a10.1007/978-3-319-45931-8$$2doi 000761379 035__ $$aSP(OCoLC)ocn958963356 000761379 035__ $$aSP(OCoLC)958963356$$z(OCoLC)961007339 000761379 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dNJR$$dYDX$$dOCLCF$$dOCLCO 000761379 049__ $$aISEA 000761379 050_4 $$aQA76.9.A25 000761379 08204 $$a005.8/2$$223 000761379 1112_ $$aWISTP (Conference)$$n(10th :$$d2016 :$$cĒrakleion, Greece) 000761379 24510 $$aInformation security theory and practice :$$b10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26?27, 2016, Proceedings /$$cSara Foresti, Javier Lopez (eds.). 000761379 2463_ $$aWISTP 2016 000761379 264_1 $$aSwitzerland :$$bSpringer,$$c2016. 000761379 300__ $$a1 online resource (x, 271 pages) :$$billustrations. 000761379 336__ $$atext$$btxt$$2rdacontent 000761379 337__ $$acomputer$$bc$$2rdamedia 000761379 338__ $$aonline resource$$bcr$$2rdacarrier 000761379 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v9895 000761379 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000761379 500__ $$aInternational conference proceedings. 000761379 500__ $$aIncludes author index. 000761379 5050_ $$aAuthentication and key management -- Secure hardware systems -- Attacks to software and network systems -- Access control and data protection. 000761379 506__ $$aAccess limited to authorized users. 000761379 520__ $$aThis volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection. 000761379 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 23, 2016). 000761379 650_0 $$aComputer security$$vCongresses. 000761379 650_0 $$aUbiquitous computing$$vCongresses. 000761379 7001_ $$aForesti, Sara,$$eeditor. 000761379 7001_ $$aLópez, Javier,$$eeditor. 000761379 830_0 $$aLecture notes in computer science ;$$v9895. 000761379 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000761379 852__ $$bebk 000761379 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-45931-8$$zOnline Access$$91397441.1 000761379 909CO $$ooai:library.usi.edu:761379$$pGLOBAL_SET 000761379 980__ $$aEBOOK 000761379 980__ $$aBIB 000761379 982__ $$aEbook 000761379 983__ $$aOnline 000761379 994__ $$a92$$bISE