9783319186207-3319186205-Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 ... and Communication Technology, 457)

Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 ... and Communication Technology, 457)

ISBN-13: 9783319186207
ISBN-10: 3319186205
Edition: 2015
Author: Jan Camenisch, Simone Fischer-Hübner, Marit Hansen
Publication date: 2015
Publisher: Springer
Format: Hardcover 277 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783319186207
ISBN-10: 3319186205
Edition: 2015
Author: Jan Camenisch, Simone Fischer-Hübner, Marit Hansen
Publication date: 2015
Publisher: Springer
Format: Hardcover 277 pages

Summary

Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 ... and Communication Technology, 457) (ISBN-13: 9783319186207 and ISBN-10: 3319186205), written by authors Jan Camenisch, Simone Fischer-Hübner, Marit Hansen, was published by Springer in 2015. With an overall rating of 4.1 stars, it's a notable title among other Information Management (Processes & Infrastructure, Computer Science, Network Security, Security & Encryption, History & Culture, Management & Leadership) books. You can easily purchase or rent Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 ... and Communication Technology, 457) (Hardcover) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.27.

Description

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book