Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: WISA Jeju (VerfasserIn)
Weitere Verfasser: Kang, Brent ByungHoon (HerausgeberIn), Kim, Taesoo (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2018]
Schriftenreihe:Lecture Notes in Computer Science 10763
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV045099613
003 DE-604
005 20180817
007 cr|uuu---uuuuu
008 180724s2018 xx a||| o|||| 10||| eng d
020 |a 9783319935638  |c Online  |9 978-3-319-93563-8 
024 7 |a 10.1007/978-3-319-93563-8  |2 doi 
035 |a (ZDB-2-SCS)9783319935638 
035 |a (ZDB-2-LNC)9783319935638 
035 |a (OCoLC)1047472270 
035 |a (DE-599)BVBBV045099613 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 055f  |2 stub 
084 |a DAT 000  |2 stub 
084 |a DAT 465f  |2 stub 
111 2 |a WISA  |n 18.  |d 2017  |c Jeju  |j Verfasser  |0 (DE-588)1162461497  |4 aut 
245 1 0 |a Information security applications  |b 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers  |c Brent ByungHoon Kang, Taesoo Kim (Eds.) 
264 1 |a Cham  |b Springer  |c [2018] 
300 |a 1 Online-Ressource (XI, 338 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 10763  |x 0302-9743 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Data Encryption 
650 4 |a Computer Communication Networks 
650 4 |a Computers and Society 
650 4 |a Legal Aspects of Computing 
650 4 |a Information Systems Applications (incl. Internet) 
650 4 |a Computer science 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computers and civilization 
650 4 |a Computers 
650 4 |a Law and legislation 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerforensik  |0 (DE-588)4774034-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 1 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 0 |5 DE-604 
689 1 0 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 1 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 1 2 |a Computerforensik  |0 (DE-588)4774034-6  |D s 
689 1 |5 DE-604 
689 2 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 2 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 2 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 2 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 |5 DE-604 
700 1 |a Kang, Brent ByungHoon  |4 edt 
700 1 |a Kim, Taesoo  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-319-93562-1 
830 0 |a Lecture Notes in Computer Science  |v 10763  |w (DE-604)BV014880109  |9 10763 
856 4 0 |u https://doi.org/10.1007/978-3-319-93563-8  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2018 
940 1 |q ZDB-2-LNC_2018 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030490216 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2018  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-93563-8  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2349457
_version_ 1822409735895252992
adam_text
any_adam_object
author2 Kang, Brent ByungHoon
Kim, Taesoo
author2_role edt
edt
author2_variant b b k bb bbk
t k tk
author_corporate WISA Jeju
author_corporate_role aut
author_facet Kang, Brent ByungHoon
Kim, Taesoo
WISA Jeju
author_sort WISA Jeju
building Verbundindex
bvnumber BV045099613
classification_rvk SS 4800
classification_tum DAT 055f
DAT 000
DAT 465f
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783319935638
(ZDB-2-LNC)9783319935638
(OCoLC)1047472270
(DE-599)BVBBV045099613
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-93563-8
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV045099613</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180817</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180724s2018 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319935638</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-93563-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-93563-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319935638</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319935638</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1047472270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045099613</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">WISA</subfield><subfield code="n">18.</subfield><subfield code="d">2017</subfield><subfield code="c">Jeju</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1162461497</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security applications</subfield><subfield code="b">18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers</subfield><subfield code="c">Brent ByungHoon Kang, Taesoo Kim (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 338 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10763</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law and legislation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kang, Brent ByungHoon</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Taesoo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-93562-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10763</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10763</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2018</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030490216</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2018</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-93563-8</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV045099613
illustrated Illustrated
indexdate 2025-01-27T13:42:38Z
institution BVB
institution_GND (DE-588)1162461497
isbn 9783319935638
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030490216
oclc_num 1047472270
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (XI, 338 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2018
ZDB-2-LNC_2018
ZDB-2-LNC ZDB-2-LNC_2018
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spelling WISA 18. 2017 Jeju Verfasser (DE-588)1162461497 aut
Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (Eds.)
Cham Springer [2018]
1 Online-Ressource (XI, 338 Seiten) Illustrationen, Diagramme
txt rdacontent
c rdamedia
cr rdacarrier
Lecture Notes in Computer Science 10763 0302-9743
Computer Science
Systems and Data Security
Data Encryption
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Rechnernetz (DE-588)4070085-9 gnd rswk-swf
Authentifikation (DE-588)4330656-1 gnd rswk-swf
Kryptosystem (DE-588)4209132-9 gnd rswk-swf
Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computerforensik (DE-588)4774034-6 gnd rswk-swf
Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift gnd-content
Kryptoanalyse (DE-588)4830502-9 s
Kryptosystem (DE-588)4209132-9 s
DE-604
Sicherheitsprotokoll (DE-588)4709127-7 s
Authentifikation (DE-588)4330656-1 s
Computerforensik (DE-588)4774034-6 s
Rechnernetz (DE-588)4070085-9 s
Datensicherung (DE-588)4011144-1 s
Computersicherheit (DE-588)4274324-2 s
Kang, Brent ByungHoon edt
Kim, Taesoo edt
Erscheint auch als Druck-Ausgabe 978-3-319-93562-1
Lecture Notes in Computer Science 10763 (DE-604)BV014880109 10763
https://doi.org/10.1007/978-3-319-93563-8 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers
Lecture Notes in Computer Science
Computer Science
Systems and Data Security
Data Encryption
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Kryptosystem (DE-588)4209132-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Computerforensik (DE-588)4774034-6 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
subject_GND (DE-588)4011144-1
(DE-588)4070085-9
(DE-588)4330656-1
(DE-588)4209132-9
(DE-588)4830502-9
(DE-588)4274324-2
(DE-588)4774034-6
(DE-588)4709127-7
(DE-588)1071861417
title Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers
title_auth Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers
title_exact_search Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers
title_full Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (Eds.)
title_fullStr Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (Eds.)
title_full_unstemmed Information security applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (Eds.)
title_short Information security applications
title_sort information security applications 18th international conference wisa 2017 jeju island korea august 24 26 2017 revised selected papers
title_sub 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers
topic Computer Science
Systems and Data Security
Data Encryption
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Kryptosystem (DE-588)4209132-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Computerforensik (DE-588)4774034-6 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
topic_facet Computer Science
Systems and Data Security
Data Encryption
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Information Systems Applications (incl. Internet)
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Computers and civilization
Computers
Law and legislation
Datensicherung
Rechnernetz
Authentifikation
Kryptosystem
Kryptoanalyse
Computersicherheit
Computerforensik
Sicherheitsprotokoll
Konferenzschrift
url https://doi.org/10.1007/978-3-319-93563-8
volume_link (DE-604)BV014880109
work_keys_str_mv AT wisajeju informationsecurityapplications18thinternationalconferencewisa2017jejuislandkoreaaugust24262017revisedselectedpapers
AT kangbrentbyunghoon informationsecurityapplications18thinternationalconferencewisa2017jejuislandkoreaaugust24262017revisedselectedpapers
AT kimtaesoo informationsecurityapplications18thinternationalconferencewisa2017jejuislandkoreaaugust24262017revisedselectedpapers