Normal view MARC view ISBD view

Data and Applications Security and Privacy XXV [electronic resource] : 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings / edited by Yingjiu Li.

By: Li, Yingjiu [editor.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6818Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XI, 309p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642223488.Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information systems | Information Systems | Computer Science | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Information Systems Applications (incl.Internet) | Algorithm Analysis and Problem Complexity | Systems and Data SecurityDDC classification: 004.6 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue