Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Wang, Guojun (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: [Cham] Springer [2016]
Schriftenreihe:Lecture Notes in Computer Science 10067
Schlagworte:
Online-Zugang:BTU01
FHA01
FHI01
FHM01
FHN01
FHR01
FKE01
FRO01
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UER01
UPA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV043932685
003 DE-604
005 20170118
006 a |||| 10|||
007 cr|uuu---uuuuu
008 161205s2016 |||| o||u| ||||||eng d
020 |a 9783319491455  |c Online  |9 978-3-319-49145-5 
020 |a 9783319491448  |c Print  |9 978-3-319-49144-8 
024 7 |a 10.1007/978-3-319-49145-5  |2 doi 
035 |a (ZDB-2-SCS)978-3-319-49145-5 
035 |a (ZDB-2-LNC)978-3-319-49145-5 
035 |a (OCoLC)965666775 
035 |a (DE-599)BVBBV043932685 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-20  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634  |a DE-355 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
245 1 0 |a Security, privacy and anonymity in computation, communication and storage  |b SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings  |c Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi (Eds.) 
264 1 |a [Cham]  |b Springer  |c [2016] 
264 4 |c © 2016 
300 |a 1 Online Ressource XXIV, 392 Seiten  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
340 |a Online-Ressource 
490 1 |a Lecture Notes in Computer Science  |v Volume 10067  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Management information systems 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Security 
650 4 |a Data Encryption 
650 4 |a Management of Computing and Information Systems 
650 4 |a Information Systems Applications (incl. Internet) 
650 4 |a Computer Communication Networks 
650 4 |a Informatik 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2016  |z Zhangjiajie  |2 gnd-content 
700 1 |a Wang, Guojun  |0 (DE-588)1044807768  |4 edt 
711 2 |a SpaCCS  |n 9.  |d 2016  |c Zhangjiajie  |0 (DE-588)1123104441  |4 oth 
711 2 |a TrustData  |n 7.  |d 2016  |c Zhangjiajie  |0 (DE-588)1123237840  |4 oth 
830 0 |a Lecture Notes in Computer Science  |v 10067  |w (DE-604)BV014880109  |9 10067 
856 4 0 |u https://doi.org/10.1007/978-3-319-49145-5  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2016 
999 |a oai:aleph.bib-bvb.de:BVB01-029341700 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l BTU01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FHI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l HTW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2016  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBR01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UBY01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-49145-5  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2239806
DE-BY-TUM_local_url Verlag
https://doi.org/10.1007/978-3-319-49145-5
DE-BY-UBG_katkey 196112003
DE-BY-UBG_local_url Verlag
https://doi.org/10.1007/978-3-319-49145-5
_version_ 1816714276311662592
any_adam_object
author2 Wang, Guojun
author2_role edt
author2_variant g w gw
author_GND (DE-588)1044807768
author_facet Wang, Guojun
building Verbundindex
bvnumber BV043932685
classification_tum DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)978-3-319-49145-5
(ZDB-2-LNC)978-3-319-49145-5
(OCoLC)965666775
(DE-599)BVBBV043932685
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-49145-5
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04410nmm a2200841zcb4500</leader><controlfield tag="001">BV043932685</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170118 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161205s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319491455</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-49145-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319491448</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-49144-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-49145-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-49145-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)978-3-319-49145-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)965666775</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043932685</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy and anonymity in computation, communication and storage</subfield><subfield code="b">SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings</subfield><subfield code="c">Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource XXIV, 392 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 10067</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Zhangjiajie</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Guojun</subfield><subfield code="0">(DE-588)1044807768</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SpaCCS</subfield><subfield code="n">9.</subfield><subfield code="d">2016</subfield><subfield code="c">Zhangjiajie</subfield><subfield code="0">(DE-588)1123104441</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">TrustData</subfield><subfield code="n">7.</subfield><subfield code="d">2016</subfield><subfield code="c">Zhangjiajie</subfield><subfield code="0">(DE-588)1123237840</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10067</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10067</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029341700</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-49145-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2016 Zhangjiajie gnd-content
genre_facet Konferenzschrift 2016 Zhangjiajie
id DE-604.BV043932685
illustrated Not Illustrated
index_date 2024-09-20T13:29:36Z
indexdate 2024-11-25T17:51:13Z
institution BVB
institution_GND (DE-588)1123104441
(DE-588)1123237840
isbn 9783319491455
9783319491448
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029341700
oclc_num 965666775
open_access_boolean
owner DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-355
DE-BY-UBR
owner_facet DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
DE-355
DE-BY-UBR
physical 1 Online Ressource XXIV, 392 Seiten Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2016
ZDB-2-LNC ZDB-2-LNC_2016
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings
Lecture Notes in Computer Science
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Management information systems
Computer Science
Systems and Data Security
Security
Data Encryption
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
Informatik
subject_GND (DE-588)1071861417
title Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings
title_auth Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings
title_exact_search Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings
title_full Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi (Eds.)
title_fullStr Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi (Eds.)
title_full_unstemmed Security, privacy and anonymity in computation, communication and storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings Guojun Wang, Indrakshi Ray, Jose M. Alcaraz Calero, Sabu M. Thampi (Eds.)
title_short Security, privacy and anonymity in computation, communication and storage
title_sort security privacy and anonymity in computation communication and storage spaccs 2016 international workshops trustdata tsp nope dependsys bigdataspt and wcssc zhangjiajie china november 16 18 2016 proceedings
title_sub SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016 : proceedings
topic Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Management information systems
Computer Science
Systems and Data Security
Security
Data Encryption
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
Informatik
topic_facet Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Management information systems
Computer Science
Systems and Data Security
Security
Data Encryption
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computer Communication Networks
Informatik
Konferenzschrift 2016 Zhangjiajie
url https://doi.org/10.1007/978-3-319-49145-5
volume_link (DE-604)BV014880109
work_keys_str_mv AT wangguojun securityprivacyandanonymityincomputationcommunicationandstoragespaccs2016internationalworkshopstrustdatatspnopedependsysbigdatasptandwcssczhangjiajiechinanovember16182016proceedings
AT spaccszhangjiajie securityprivacyandanonymityincomputationcommunicationandstoragespaccs2016internationalworkshopstrustdatatspnopedependsysbigdatasptandwcssczhangjiajiechinanovember16182016proceedings
AT trustdatazhangjiajie securityprivacyandanonymityincomputationcommunicationandstoragespaccs2016internationalworkshopstrustdatatspnopedependsysbigdatasptandwcssczhangjiajiechinanovember16182016proceedings