000771405 000__ 02936cam\a2200565Mi\4500 000771405 001__ 771405 000771405 005__ 20230306142621.0 000771405 006__ m\\\\\o\\d\\\\\\\\ 000771405 007__ cr\un\nnnunnun 000771405 008__ 161123s2016\\\\gw\\\\\\o\\\\\000\0\eng\d 000771405 019__ $$a965148183$$a966204224$$a966891414 000771405 020__ $$a9783319498065 000771405 020__ $$a3319498061 000771405 020__ $$z9783319498058 000771405 020__ $$z3319498053 000771405 0247_ $$a10.1007/978-3-319-49806-5$$2doi 000771405 035__ $$aSP(OCoLC)ocn967711943 000771405 035__ $$aSP(OCoLC)967711943$$z(OCoLC)965148183$$z(OCoLC)966204224$$z(OCoLC)966891414 000771405 040__ $$aUPM$$beng$$cUPM$$dOCLCO$$dYDX$$dGW5XE$$dNJR$$dOCLCF 000771405 049__ $$aISEA 000771405 050_4 $$aQA76.9.A25 000771405 08204 $$a005.8$$223 000771405 24500 $$aInformation Systems Security$$h[electronic resource] :$$b12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings /$$cedited by Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti. 000771405 264_1 $$aCham :$$bSpringer International Publishing :$$bImprint: Springer,$$c2016. 000771405 300__ $$a1 online resource (xv, 544 pages) :$$billustrations. 000771405 336__ $$atext$$btxt$$2rdacontent 000771405 337__ $$acomputer$$bc$$2rdamedia 000771405 338__ $$aonline resource$$bcr$$2rdacarrier 000771405 347__ $$atext file$$bPDF$$2rda 000771405 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v10063 000771405 5050_ $$aAttacks and mitigation -- Authentication -- Authorization and information flow control -- Crypto systems and protocols -- Network security and intrusion detection -- Privacy -- Software security -- Wireless, mobile and IoT security. . 000771405 506__ $$aAccess limited to authorized users. 000771405 520__ $$aThis book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. . 000771405 650_0 $$aComputer science. 000771405 650_0 $$aComputer networks. 000771405 650_0 $$aComputer security. 000771405 650_0 $$aData encryption (Computer science) 000771405 650_0 $$aAlgorithms. 000771405 650_0 $$aManagement information systems. 000771405 7001_ $$aRay, Indrajit.$$eeditor. 000771405 7001_ $$aGaur, Manoj Singh.$$eeditor. 000771405 7001_ $$aConti, Mauro.$$eeditor. 000771405 7001_ $$aSanghi, Dheeraj.$$eeditor. 000771405 7001_ $$aKamakoti, V.$$eeditor. 000771405 77608 $$iPrint version:$$z9783319498058 000771405 830_0 $$aLecture notes in computer science ;$$v10063. 000771405 852__ $$bebk 000771405 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-49806-5$$zOnline Access$$91397441.1 000771405 909CO $$ooai:library.usi.edu:771405$$pGLOBAL_SET 000771405 980__ $$aEBOOK 000771405 980__ $$aBIB 000771405 982__ $$aEbook 000771405 983__ $$aOnline 000771405 994__ $$a92$$bISE