000779759 000__ 02909cam\a2200553Ii\4500 000779759 001__ 779759 000779759 005__ 20230306143037.0 000779759 006__ m\\\\\o\\d\\\\\\\\ 000779759 007__ cr\nn\nnnunnun 000779759 008__ 170227s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000779759 019__ $$a974475093$$a974558226$$a981776748 000779759 020__ $$a9783319544335$$q(electronic book) 000779759 020__ $$a3319544330$$q(electronic book) 000779759 020__ $$z9783319544328 000779759 020__ $$z3319544322 000779759 0247_ $$a10.1007/978-3-319-54433-5$$2doi 000779759 035__ $$aSP(OCoLC)ocn973881611 000779759 035__ $$aSP(OCoLC)973881611$$z(OCoLC)974475093$$z(OCoLC)974558226$$z(OCoLC)981776748 000779759 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dNJR$$dUAB$$dOCLCF$$dCOO$$dIOG$$dAZU$$dUWO$$dUPM 000779759 049__ $$aISEA 000779759 050_4 $$aTK5105.59 000779759 08204 $$a005.8$$223 000779759 1112_ $$aICISSP (Conference)$$n(2nd :$$d2016 :$$cRome, Italy) 000779759 24510 $$aInformation systems security and privacy :$$bsecond International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised selected papers /$$cOlivier Camp, Steven Furnell, Paolo Mori (eds.). 000779759 2463_ $$aICISSP 2016 000779759 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000779759 300__ $$a1 online resource (xii, 215 pages) :$$billustrations. 000779759 336__ $$atext$$btxt$$2rdacontent 000779759 337__ $$acomputer$$bc$$2rdamedia 000779759 338__ $$aonline resource$$bcr$$2rdacarrier 000779759 347__ $$atext file$$bPDF$$2rda 000779759 4901_ $$aCommunications in Computer and Information Science,$$x1865-0929 ;$$v691 000779759 500__ $$aIncludes author index. 000779759 5050_ $$aData and software security -- Privacy and confidentiality -- Mobile systems security -- Biometric authentication -- Privacy in social media. 000779759 506__ $$aAccess limited to authorized users. 000779759 520__ $$aThis book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016. The 9 full papers presented together with two invited papers were carefully reviewed and selected from a total of 91 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; privacy in social media. 000779759 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 27, 2017). 000779759 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000779759 650_0 $$aData encryption (Computer science)$$vCongresses. 000779759 650_0 $$aData protection$$vCongresses. 000779759 7001_ $$aCamp, Olivier,$$eeditor. 000779759 7001_ $$aFurnell, Steven,$$d1970-$$eeditor. 000779759 7001_ $$aMori, Paolo,$$eeditor. 000779759 77608 $$iPrint version:$$z3319544322$$z9783319544328$$w(OCoLC)971344931 000779759 830_0 $$aCommunications in computer and information science ;$$v691. 000779759 852__ $$bebk 000779759 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-54433-5$$zOnline Access$$91397441.1 000779759 909CO $$ooai:library.usi.edu:779759$$pGLOBAL_SET 000779759 980__ $$aEBOOK 000779759 980__ $$aBIB 000779759 982__ $$aEbook 000779759 983__ $$aOnline 000779759 994__ $$a92$$bISE