Amazon cover image
Image from Amazon.com

Security in Computing and Communications [electronic resource] : Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings / edited by Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez.

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 536Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015Description: XXI, 548 p. 239 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319229157
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
Online resources:
Contents:
Security in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
No physical items for this record

Security in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security.

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.