Technology and Practice of Passwords [recurso electrónico] : 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7?9, 2015, Proceedings / edited by Frank Stajano, Stig F. Mjølsnes, Graeme Jenkinson, Per Thorsheim.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 9551Editor: Cham : Springer International Publishing : Imprint: Springer, 2016Edición: 1st ed. 2016Descripción: XV, 151 p. 19 illus. in color. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783319299389Tema(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Algorithms | Computers and civilization | Management information systems | Computer Science | Systems and Data Security | Computer Communication Networks | Data Encryption | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Computers and SocietyFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Passwords, PASSWORDS 2015, held in Cambridge, UK, in December 2015. The 6 revised full papers presented together with 3 revised short papers were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on human factors, attacks, and cryptography.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | 1 | No para préstamo |
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Passwords, PASSWORDS 2015, held in Cambridge, UK, in December 2015. The 6 revised full papers presented together with 3 revised short papers were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on human factors, attacks, and cryptography.