Overview
- Fast-track conference proceedings
- State-of-the-art research
- Up-to-date results
Part of the book series: Communications in Computer and Information Science (CCIS, volume 426)
Included in the following conference series:
Conference proceedings info: ISCTCS 2013.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (49 papers)
Other volumes
-
Trustworthy Computing and Services
Keywords
- Database and storage security
- Information accountability and usage control
- Intrusion detection
- Management and querying of encrypted data
- Mobile and wireless security
- Network security
- Security in hardware
- Security protocols
- Security services
- Social network security and privacy
- Software and application security
- Systems security
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Trustworthy Computing and Services
Book Subtitle: International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers
Editors: Yuyu Yuan, Xu Wu, Yueming Lu
Series Title: Communications in Computer and Information Science
DOI: https://doi.org/10.1007/978-3-662-43908-1
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2014
Softcover ISBN: 978-3-662-43907-4Published: 14 July 2014
eBook ISBN: 978-3-662-43908-1Published: 26 June 2014
Series ISSN: 1865-0929
Series E-ISSN: 1865-0937
Edition Number: 1
Number of Pages: XIV, 408
Number of Illustrations: 205 b/w illustrations
Topics: Systems and Data Security