Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Thuraisingham, Bhavani M. 1954- (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer International Publishing 2015
Ausgabe:1st ed. 2015
Schriftenreihe:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 164
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-859
DE-860
DE-861
DE-473
DE-19
DE-355
DE-703
DE-20
DE-29
DE-739
URL des Erstveröffentlichers
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV043504233
003 DE-604
005 20160506
007 cr|uuu---uuuuu
008 160411s2015 xx o|||| 10||| eng d
020 |a 9783319288659  |c Online  |9 978-3-319-28865-9 
024 7 |a 10.1007/978-3-319-28865-9  |2 doi 
035 |a (ZDB-2-SCS)978-3-319-28865-9 
035 |a (OCoLC)936856730 
035 |a (DE-599)BVBBV043504233 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-19  |a DE-Aug4  |a DE-861  |a DE-M347  |a DE-573  |a DE-859  |a DE-703  |a DE-473  |a DE-29  |a DE-20  |a DE-634  |a DE-92  |a DE-739  |a DE-860 
082 0 |a 005.8  |2 23 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
100 1 |a Thuraisingham, Bhavani M.  |d 1954-  |e Verfasser  |0 (DE-588)101927705X  |4 aut 
245 1 0 |a Security and Privacy in Communication Networks  |b 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers  |c edited by Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran 
250 |a 1st ed. 2015 
264 1 |a Cham  |b Springer International Publishing  |c 2015 
300 |a 1 Online-Ressource (XIII, 741 p. 240 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  |v 164  |x 1867-8211 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computers and civilization 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Computers and Society 
650 4 |a Data Encryption 
650 4 |a Informatik 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kommunikationssystem  |0 (DE-588)4125542-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Informatik  |0 (DE-588)4026894-9  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Informatik  |0 (DE-588)4026894-9  |D s 
689 0 1 |a Kommunikationssystem  |0 (DE-588)4125542-2  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
700 1 |a Wang, XiaoFeng  |e Sonstige  |4 oth 
700 1 |a Yegneswaran, Vinod  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-3-319-28864-2 
830 0 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  |v 164  |w (DE-604)BV041557366  |9 164 
856 4 0 |u https://doi.org/10.1007/978-3-319-28865-9  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920578&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2015 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028920578 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-28865-9  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBR_katkey 6740701
_version_ 1822711186150391808
adam_text SECURITY AND PRIVACY IN COMMUNICATION NETWORKS / : 2015 ABSTRACT / INHALTSTEXT THIS VOLUME CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2015, HELD IN DALLAS, TX, USA, IN OCTOBER 2015. THE 29 REGULAR AND 10 POSTER PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 107 SUBMISSIONS. IT ALSO PRESENTS 9 PAPERS ACCEPTED OF THE WORKSHOP ON APPLICATIONS AND TECHNIQUES IN CYBER SECURITY, ATCS 2015. THE PAPERS ARE GROUPED IN THE FOLLOWING TOPICS: MOBILE, SYSTEM, AND SOFTWARE SECURITY; CLOUD SECURITY; PRIVACY AND SIDE CHANNELS; WEB AND NETWORK SECURITY; CRYPTO, PROTOCOL, AND MODEL DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author Thuraisingham, Bhavani M. 1954-
author_GND (DE-588)101927705X
author_facet Thuraisingham, Bhavani M. 1954-
author_role aut
author_sort Thuraisingham, Bhavani M. 1954-
author_variant b m t bm bmt
building Verbundindex
bvnumber BV043504233
classification_rvk ST 276
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)978-3-319-28865-9
(OCoLC)936856730
(DE-599)BVBBV043504233
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-28865-9
edition 1st ed. 2015
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV043504233</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160506</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160411s2015 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319288659</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-28865-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-28865-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-28865-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936856730</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043504233</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thuraisingham, Bhavani M.</subfield><subfield code="d">1954-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)101927705X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Privacy in Communication Networks</subfield><subfield code="b">11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers</subfield><subfield code="c">edited by Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 741 p. 240 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">164</subfield><subfield code="x">1867-8211</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationssystem</subfield><subfield code="0">(DE-588)4125542-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationssystem</subfield><subfield code="0">(DE-588)4125542-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, XiaoFeng</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yegneswaran, Vinod</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-28864-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">164</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">164</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028920578&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028920578</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28865-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV043504233
illustrated Not Illustrated
indexdate 2025-01-28T05:58:26Z
institution BVB
isbn 9783319288659
issn 1867-8211
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028920578
oclc_num 936856730
open_access_boolean
owner DE-355
DE-BY-UBR
DE-19
DE-BY-UBM
DE-Aug4
DE-861
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-20
DE-634
DE-92
DE-739
DE-860
owner_facet DE-355
DE-BY-UBR
DE-19
DE-BY-UBM
DE-Aug4
DE-861
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-20
DE-634
DE-92
DE-739
DE-860
physical 1 Online-Ressource (XIII, 741 p. 240 illus. in color)
psigel ZDB-2-SCS
ZDB-2-SCS_2015
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Springer International Publishing
record_format marc
series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
series2 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
spellingShingle Thuraisingham, Bhavani M. 1954-
Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computer Science
Systems and Data Security
Computers and Society
Data Encryption
Informatik
Datensicherung (DE-588)4011144-1 gnd
Kommunikationssystem (DE-588)4125542-2 gnd
Informatik (DE-588)4026894-9 gnd
subject_GND (DE-588)4011144-1
(DE-588)4125542-2
(DE-588)4026894-9
(DE-588)1071861417
title Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers
title_auth Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers
title_exact_search Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers
title_full Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers edited by Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran
title_fullStr Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers edited by Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran
title_full_unstemmed Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers edited by Bhavani Thuraisingham, XiaoFeng Wang, Vinod Yegneswaran
title_short Security and Privacy in Communication Networks
title_sort security and privacy in communication networks 11th international conference securecomm 2015 dallas tx usa october 26 29 2015 revised selected papers
title_sub 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers
topic Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computer Science
Systems and Data Security
Computers and Society
Data Encryption
Informatik
Datensicherung (DE-588)4011144-1 gnd
Kommunikationssystem (DE-588)4125542-2 gnd
Informatik (DE-588)4026894-9 gnd
topic_facet Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computer Science
Systems and Data Security
Computers and Society
Data Encryption
Informatik
Datensicherung
Kommunikationssystem
Konferenzschrift
url https://doi.org/10.1007/978-3-319-28865-9
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920578&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV041557366
work_keys_str_mv AT thuraisinghambhavanim securityandprivacyincommunicationnetworks11thinternationalconferencesecurecomm2015dallastxusaoctober26292015revisedselectedpapers
AT wangxiaofeng securityandprivacyincommunicationnetworks11thinternationalconferencesecurecomm2015dallastxusaoctober26292015revisedselectedpapers
AT yegneswaranvinod securityandprivacyincommunicationnetworks11thinternationalconferencesecurecomm2015dallastxusaoctober26292015revisedselectedpapers