This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : Brook Bookstore On Demand, Napoli, NA, Italie
Etat : new. Questo è un articolo print on demand. N° de réf. du vendeur 492f4f627379ef1de49581d57ec42168
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9783642331664_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
PF. Etat : New. N° de réf. du vendeur 6666-IUK-9783642331664
Quantité disponible : 10 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security. 916 pp. Englisch. N° de réf. du vendeur 9783642331664
Quantité disponible : 2 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand pp. 916 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. N° de réf. du vendeur 51008056
Quantité disponible : 4 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. pp. 916. N° de réf. du vendeur 2658584551
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND pp. 916. N° de réf. du vendeur 1858584557
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Kartoniert / Broschiert. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Fast-track conference proceedingsSate-of-the-art researchUp-to-date resultsThis book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included i. N° de réf. du vendeur 5057178
Quantité disponible : Plus de 20 disponibles
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 2012 edition. 890 pages. 9.25x6.25x1.75 inches. In Stock. N° de réf. du vendeur x-3642331661
Quantité disponible : 2 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012.The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 916 pp. Englisch. N° de réf. du vendeur 9783642331664
Quantité disponible : 1 disponible(s)