000 | 03239nam a22003975i 4500 | ||
---|---|---|---|
001 | 301335 | ||
003 | MX-SnUAN | ||
005 | 20160429155705.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2009 gw | o |||| 0|eng d | ||
020 |
_a9783642102400 _99783642102400 |
||
024 | 7 |
_a10.1007/9783642102400 _2doi |
|
035 | _avtls000354171 | ||
039 | 9 |
_a201509030521 _bVLOAD _c201405060331 _dVLOAD _y201402181011 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aKim, Haeng-kon. _eeditor. _9334368 |
|
245 | 1 | 0 |
_aAdvances in Security Technology : _bInternational Conference, SecTech 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers / _cedited by Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2009. |
|
300 | _brecurso en línea. | ||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aCommunications in Computer and Information Science, _x1865-0929 ; _v29 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aSecurity Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions -- Feature Extraction for IRIS Recognition -- Bidirectional Quantum Secure Direct Communication Based on Entanglement -- Study and Implementation of SELinux-Like Access Control Mechanism Based on Linux -- Research on Streaming Data Integration System about Security Threat Monitor -- Using Honeypots to Secure E-Government Networks -- Trust-Risk-Game Based Access Control in Cross Domain Application -- Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Development Projects through a Controlled Experiment -- Software Project Profitability Analysis Using Temporal Probabilistic Reasoning; An Empirical Study with the CASSE Framework -- A Secured Technique for Image Data Hiding. | |
520 | _aThis volume constitutes the selected and extended papers of the International Conference on Advances in Security Technology, SecTech 2008, and Its Special Sessions, held in Sanya, Hainan Island, China in December 2008. The book includes the special sessions on advanced security technologies towards convergence and green IT (AST-CGIT 2008), on biometrics: security and privacy (BSP 2008), on security education (ASSSE 2008), on security engineering environment (SEE 2008), wireless networks (WN 2008). | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aKim, Tai-hoon. _eeditor. _9334369 |
|
700 | 1 |
_aKiumi, Akingbehin. _eeditor. _9339074 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783642102394 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-10240-0 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c301335 _d301335 |