Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Qing, Sihan (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: [Cham] Springer [2016]
Schriftenreihe:Lecture Notes in Computer Science 9543
Schlagworte:
Online-Zugang:BTU01
FHA01
FHI01
FHM01
FHN01
FHR01
FKE01
FRO01
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UER01
UPA01
URL des Erstveröffentlichers
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV043503871
003 DE-604
005 20200514
006 a |||| 10|||
007 cr|uuu---uuuuu
008 160411s2016 |||| o||u| ||||||eng d
020 |a 9783319298146  |c Online  |9 978-3-319-29814-6 
020 |a 9783319298139  |c Print  |9 978-3-319-29813-9 
024 7 |a 10.1007/978-3-319-29814-6  |2 doi 
035 |a (ZDB-2-SCS)978-3-319-29814-6 
035 |a (ZDB-2-LNC)978-3-319-29814-6 
035 |a (OCoLC)946143209 
035 |a (DE-599)BVBBV043503871 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-706  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-859  |a DE-473  |a DE-29  |a DE-20  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-739  |a DE-634  |a DE-523 
082 0 |a 005.82  |2 23 
084 |a DAT 461f  |2 stub 
084 |a DAT 465f  |2 stub 
084 |a DAT 000  |2 stub 
245 1 0 |a Information and communications security  |b 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers  |c edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu 
264 1 |a [Cham]  |b Springer  |c [2016] 
264 4 |c © 2016 
300 |a 1 Online-Ressource XVIII, 486 Seiten  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v Volume 9543  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Algorithms 
650 4 |a Computers and civilization 
650 4 |a Management information systems 
650 4 |a Computer Science 
650 4 |a Data Encryption 
650 4 |a Systems and Data Security 
650 4 |a Algorithm Analysis and Problem Complexity 
650 4 |a Computer Communication Networks 
650 4 |a Management of Computing and Information Systems 
650 4 |a Computers and Society 
650 4 |a Informatik 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 3 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 4 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 1 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 1 |5 DE-604 
700 1 |a Qing, Sihan  |0 (DE-588)1046197304  |4 edt 
711 2 |a ICICS  |n 17.  |d 2015  |c Peking  |j Sonstige  |0 (DE-588)1093427973  |4 oth 
830 0 |a Lecture Notes in Computer Science  |v 9543  |w (DE-604)BV014880109  |9 9543 
856 4 0 |u https://doi.org/10.1007/978-3-319-29814-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2016 
999 |a oai:aleph.bib-bvb.de:BVB01-028920216 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l BTU01  |p ZDB-2-LNC  |q ZDB-2-LNC-2016  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FHI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l HTW01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2016  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBR01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UBY01  |p ZDB-2-LNC  |q ZDB-2-LNC-2016  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-29814-6  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2190185
DE-BY-TUM_local_url Verlag
https://doi.org/10.1007/978-3-319-29814-6
DE-BY-UBG_katkey 196056742
DE-BY-UBG_local_url https://doi.org/10.1007/978-3-319-29814-6
Verlag
_version_ 1816714188741935104
adam_text INFORMATION AND COMMUNICATIONS SECURITY / : 2016 ABSTRACT / INHALTSTEXT THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS SECURITY, ICISC 2015, HELD IN BEIJING, CHINA, IN DECEMBER 2015. THE 24 REVISED FULL PAPERS AND 19 SHORT PAPERS PRESENTED WERE CAREFULLY SELECTED FROM 148 SUBMISSIONS. THE PAPERS PROVIDE THE LATEST RESULTS IN RESEARCH AND DEVELOPMENT IN THE FIELD OF INFORMATION SECURITY AND APPLIED CRYPTOLOGY DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author2 Qing, Sihan
author2_role edt
author2_variant s q sq
author_GND (DE-588)1046197304
author_facet Qing, Sihan
building Verbundindex
bvnumber BV043503871
classification_tum DAT 461f
DAT 465f
DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)978-3-319-29814-6
(ZDB-2-LNC)978-3-319-29814-6
(OCoLC)946143209
(DE-599)BVBBV043503871
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-29814-6
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05486nmm a2201069zcb4500</leader><controlfield tag="001">BV043503871</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160411s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319298146</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-29814-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319298139</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-29813-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-29814-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-29814-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)978-3-319-29814-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)946143209</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043503871</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers</subfield><subfield code="c">edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XVIII, 486 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9543</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qing, Sihan</subfield><subfield code="0">(DE-588)1046197304</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">17.</subfield><subfield code="d">2015</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1093427973</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9543</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9543</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028920216&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028920216</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC-2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29814-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV043503871
illustrated Not Illustrated
index_date 2024-09-20T13:29:36Z
indexdate 2024-11-25T17:51:13Z
institution BVB
institution_GND (DE-588)1093427973
isbn 9783319298146
9783319298139
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028920216
oclc_num 946143209
open_access_boolean
owner DE-355
DE-BY-UBR
DE-706
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-859
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-739
DE-634
DE-523
owner_facet DE-355
DE-BY-UBR
DE-706
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-859
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-739
DE-634
DE-523
physical 1 Online-Ressource XVIII, 486 Seiten Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2016
ZDB-2-LNC ZDB-2-LNC-2016
ZDB-2-LNC ZDB-2-LNC_2016
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers
Lecture Notes in Computer Science
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
Computers and Society
Informatik
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptosystem (DE-588)4209132-9 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Kryptologie (DE-588)4033329-2 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4011144-1
(DE-588)4070085-9
(DE-588)4830502-9
(DE-588)4209132-9
(DE-588)4709127-7
(DE-588)4033329-2
(DE-588)4274324-2
(DE-588)1071861417
title Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers
title_auth Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers
title_exact_search Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers
title_full Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
title_fullStr Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
title_full_unstemmed Information and communications security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers edited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu
title_short Information and communications security
title_sort information and communications security 17th international conference icics 2015 beijing china december 9 11 2015 revised selected papers
title_sub 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015 : revised selected papers
topic Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
Computers and Society
Informatik
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptosystem (DE-588)4209132-9 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Kryptologie (DE-588)4033329-2 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
Computers and Society
Informatik
Datensicherung
Rechnernetz
Kryptoanalyse
Kryptosystem
Sicherheitsprotokoll
Kryptologie
Computersicherheit
Konferenzschrift
url https://doi.org/10.1007/978-3-319-29814-6
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV014880109
work_keys_str_mv AT qingsihan informationandcommunicationssecurity17thinternationalconferenceicics2015beijingchinadecember9112015revisedselectedpapers
AT icicspeking informationandcommunicationssecurity17thinternationalconferenceicics2015beijingchinadecember9112015revisedselectedpapers