Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: SecureComm Niagara Falls, Ontario (VerfasserIn)
Weitere Verfasser: Lin, Xiaodong (HerausgeberIn), Ghorbani, Ali (HerausgeberIn), Ren, Kui (HerausgeberIn), Zhu, Sencun (HerausgeberIn), Zhang, Aiqing (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2018]
Schriftenreihe:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV044935031
003 DE-604
005 20190525
007 cr|uuu---uuuuu
008 180508s2018 xx o|||| 10||| eng d
020 |a 9783319788166  |c Online  |9 978-3-319-78816-6 
024 7 |a 10.1007/978-3-319-78816-6  |2 doi 
035 |a (ZDB-2-SCS)9783319788166 
035 |a (OCoLC)1035472048 
035 |a (DE-599)BVBBV044935031 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a ST 200  |0 (DE-625)143611:  |2 rvk 
111 2 |a SecureComm  |n 13  |d 2017  |c Niagara Falls, Ontario  |j Verfasser  |0 (DE-588)1161412379  |4 aut 
245 1 0 |a Security and privacy in communication networks  |b SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings  |c Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.) 
264 1 |a Cham  |b Springer  |c [2018] 
300 |a 1 Online-Ressource (XI, 339 Seiten, 104 illus) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  |v 239  |x 1867-8211 
650 4 |a Computer science 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Security 
650 4 |a Data Encryption 
650 4 |a Computer Communication Networks 
650 0 7 |a Telekommunikationsnetz  |0 (DE-588)4133586-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenschutz  |0 (DE-588)4011134-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2017  |z Niagara Falls, Ontario  |2 gnd-content 
689 0 0 |a Telekommunikationsnetz  |0 (DE-588)4133586-7  |D s 
689 0 1 |a Datenschutz  |0 (DE-588)4011134-9  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |8 1\p  |5 DE-604 
700 1 |a Lin, Xiaodong  |0 (DE-588)110316340X  |4 edt 
700 1 |a Ghorbani, Ali  |4 edt 
700 1 |a Ren, Kui  |0 (DE-588)134004442  |4 edt 
700 1 |a Zhu, Sencun  |4 edt 
700 1 |a Zhang, Aiqing  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-319-78815-9 
830 0 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  |v 239  |w (DE-604)BV041557366  |9 239 
856 4 0 |u https://doi.org/10.1007/978-3-319-78816-6  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2018 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030328026 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-898  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-863  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-862  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-523  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-78816-6  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBM_katkey 5628785
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-319-78816-6
DE-BY-UBR_katkey 6019873
_version_ 1823056513236729856
any_adam_object
author2 Lin, Xiaodong
Ghorbani, Ali
Ren, Kui
Zhu, Sencun
Zhang, Aiqing
author2_role edt
edt
edt
edt
edt
author2_variant x l xl
a g ag
k r kr
s z sz
a z az
author_GND (DE-588)110316340X
(DE-588)134004442
author_corporate SecureComm Niagara Falls, Ontario
author_corporate_role aut
author_facet Lin, Xiaodong
Ghorbani, Ali
Ren, Kui
Zhu, Sencun
Zhang, Aiqing
SecureComm Niagara Falls, Ontario
author_sort SecureComm Niagara Falls, Ontario
building Verbundindex
bvnumber BV044935031
classification_rvk ST 200
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)9783319788166
(OCoLC)1035472048
(DE-599)BVBBV044935031
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-78816-6
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04842nam a2200889zcb4500</leader><controlfield tag="001">BV044935031</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190525 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180508s2018 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319788166</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-78816-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-78816-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319788166</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1035472048</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044935031</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">SecureComm</subfield><subfield code="n">13</subfield><subfield code="d">2017</subfield><subfield code="c">Niagara Falls, Ontario</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1161412379</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy in communication networks</subfield><subfield code="b">SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings</subfield><subfield code="c">Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 339 Seiten, 104 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">239</subfield><subfield code="x">1867-8211</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2017</subfield><subfield code="z">Niagara Falls, Ontario</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Xiaodong</subfield><subfield code="0">(DE-588)110316340X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ghorbani, Ali</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ren, Kui</subfield><subfield code="0">(DE-588)134004442</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Sencun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Aiqing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-78815-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">239</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">239</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030328026</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-78816-6</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2017 Niagara Falls, Ontario gnd-content
genre_facet Konferenzschrift 2017 Niagara Falls, Ontario
id DE-604.BV044935031
illustrated Not Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1161412379
isbn 9783319788166
issn 1867-8211
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030328026
oclc_num 1035472048
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (XI, 339 Seiten, 104 illus)
psigel ZDB-2-SCS
ZDB-2-SCS_2018
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Springer
record_format marc
series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
series2 Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
spellingShingle Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computer Science
Systems and Data Security
Security
Data Encryption
Computer Communication Networks
Telekommunikationsnetz (DE-588)4133586-7 gnd
Datenschutz (DE-588)4011134-9 gnd
Datensicherung (DE-588)4011144-1 gnd
subject_GND (DE-588)4133586-7
(DE-588)4011134-9
(DE-588)4011144-1
(DE-588)1071861417
title Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings
title_auth Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings
title_exact_search Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings
title_full Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.)
title_fullStr Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.)
title_full_unstemmed Security and privacy in communication networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.)
title_short Security and privacy in communication networks
title_sort security and privacy in communication networks securecomm 2017 international workshops atcs and sepriot niagara falls on canada october 22 25 2017 proceedings
title_sub SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017 : proceedings
topic Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computer Science
Systems and Data Security
Security
Data Encryption
Computer Communication Networks
Telekommunikationsnetz (DE-588)4133586-7 gnd
Datenschutz (DE-588)4011134-9 gnd
Datensicherung (DE-588)4011144-1 gnd
topic_facet Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computer Science
Systems and Data Security
Security
Data Encryption
Computer Communication Networks
Telekommunikationsnetz
Datenschutz
Datensicherung
Konferenzschrift 2017 Niagara Falls, Ontario
url https://doi.org/10.1007/978-3-319-78816-6
volume_link (DE-604)BV041557366
work_keys_str_mv AT securecommniagarafallsontario securityandprivacyincommunicationnetworkssecurecomm2017internationalworkshopsatcsandsepriotniagarafallsoncanadaoctober22252017proceedings
AT linxiaodong securityandprivacyincommunicationnetworkssecurecomm2017internationalworkshopsatcsandsepriotniagarafallsoncanadaoctober22252017proceedings
AT ghorbaniali securityandprivacyincommunicationnetworkssecurecomm2017internationalworkshopsatcsandsepriotniagarafallsoncanadaoctober22252017proceedings
AT renkui securityandprivacyincommunicationnetworkssecurecomm2017internationalworkshopsatcsandsepriotniagarafallsoncanadaoctober22252017proceedings
AT zhusencun securityandprivacyincommunicationnetworkssecurecomm2017internationalworkshopsatcsandsepriotniagarafallsoncanadaoctober22252017proceedings
AT zhangaiqing securityandprivacyincommunicationnetworkssecurecomm2017internationalworkshopsatcsandsepriotniagarafallsoncanadaoctober22252017proceedings