pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES
4TH IFIP WG 11.2 INTERNATIONAL WORKSHOP, WISTP 2010, PASSAU, GERMANY, APRIL 12-14, 2010, PROCEEDINGS
By: Pierangela Samarati (Editor), Michael Tunstall (Editor), Joachim Posegga (Editor)
Format: Paperback

List price: £72.00


We believe that this item is permanently unavailable, and so we cannot source it.

ISBN 10: 3642123678
ISBN 13: 9783642123672
Publisher: SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH & CO. KG
Pub. date: 9 April, 2010
Series: Lecture Notes in Computer Science 6033
Pages: 386
Description: Constitutes the refereed proceedings of the 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, WISTP 2010, held in Passau, Germany, in April 2010.
Synopsis: These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success.WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.
Illustrations: 93 Illustrations, black and white; XIII, 386 p. 93 illus.
Publication: Germany
Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Returns: Returnable
Some other items by this author:
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (PB)
COMPUTER SECURITY - ESORICS 2004 (PB)
DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX (PB)
DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE (PB)
DATABASE SECURITY X (HB)
FAULT ANALYSIS IN CRYPTOGRAPHY (HB)
FAULT ANALYSIS IN CRYPTOGRAPHY (PB)
INFORMATION SECURITY (PB)
INFORMATION SECURITY THEORY AND PRACTICE (PB)
PRIVACY IN LOCATION-BASED APPLICATIONS (PB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (HB)
PROCEEDINGS OF THE IFIP TC 11 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE (PB)
PUBLIC KEY INFRASTRUCTURE (PB)
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII (HB)
RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII (PB)
SECURE CLOUD COMPUTING (HB)
SECURE CLOUD COMPUTING (PB)
SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY (PB)
SECURITY AND TRUST MANAGEMENT (PB)
SECURITY AND TRUST MANAGEMENT (PB)
SECURITY ASPECTS IN INFORMATION TECHNOLOGY (PB)
SECURITY OF DATA AND TRANSACTION PROCESSING (HB)
SECURITY OF DATA AND TRANSACTION PROCESSING (PB)
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (PB)
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (PB)
THEOREM PROVING WITH ANALYTIC TABLEAUX AND RELATED METHODS (PB)

TOP SELLERS IN THIS CATEGORY
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £12.74
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Introduction to Computer Security (Paperback)
Pearson Education Limited
Our Price : £67.52
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Threat Modeling (Paperback)
John Wiley & Sons Inc
Our Price : £45.90
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket