Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

Author:   Jemal H. Abawajy ,  Sougata Mukherjea ,  Sabu M. Thampi ,  Antonio Ruiz-Martínez
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2015
Volume:   536
ISBN:  

9783319229140


Pages:   548
Publication Date:   17 August 2015
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Full Product Details

Author:   Jemal H. Abawajy ,  Sougata Mukherjea ,  Sabu M. Thampi ,  Antonio Ruiz-Martínez
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2015
Volume:   536
Dimensions:   Width: 15.50cm , Height: 2.90cm , Length: 23.50cm
Weight:   0.866kg
ISBN:  

9783319229140


ISBN 10:   3319229141
Pages:   548
Publication Date:   17 August 2015
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Security in cloud computing.- Authentication and access control Systems.- Cryptography and steganography.- System and network security.- Application security.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List