Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: EAI International Conference on Security and Privacy in New Computing Environments Tientsin (VerfasserIn)
Weitere Verfasser: Li, Jin (HerausgeberIn), Liu, Zheli (HerausgeberIn), Peng, Hao (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2019]
Schriftenreihe:Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 284
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV046062587
003 DE-604
005 20200212
007 cr|uuu---uuuuu
008 190724s2019 xx a||| o|||| 10||| eng d
020 |a 9783030213732  |c Online  |9 978-3-030-21373-2 
024 7 |a 10.1007/978-3-030-21373-2  |2 doi 
035 |a (ZDB-2-SCS)9783030213732 
035 |a (ZDB-2-LNS)9783030213732 
035 |a (OCoLC)1111822627 
035 |a (DE-599)BVBBV046062587 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
111 2 |a EAI International Conference on Security and Privacy in New Computing Environments  |n 2.  |d 2019  |c Tientsin  |j Verfasser  |0 (DE-588)1204489726  |4 aut 
245 1 0 |a Security and privacy in new computing environments  |b Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings  |c Jin Li, Zheli Liu, Hao Peng (eds.) 
264 1 |a Cham  |b Springer  |c [2019] 
300 |a 1 Online-Ressource (xiv, 745 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  |v 284  |x 1867-8211 
650 4 |a Systems and Data Security 
650 4 |a Computer Communication Networks 
650 4 |a Information Systems and Communication Service 
650 4 |a Computer security 
650 4 |a Computer Communication Networks 
650 4 |a Information systems 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2019  |z Tientsin  |2 gnd-content 
700 1 |a Li, Jin  |0 (DE-588)1027830269  |4 edt 
700 1 |a Liu, Zheli  |4 edt 
700 1 |a Peng, Hao  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-21372-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-21374-9 
830 0 |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  |v 284  |w (DE-604)BV041557366  |9 284 
856 4 0 |u https://doi.org/10.1007/978-3-030-21373-2  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNS 
940 1 |q ZDB-2-SCS_2019 
940 1 |q ZDB-2-LNS_2019 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031443902 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-634  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-Aug4  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-573  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-M347  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-92  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-898  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-859  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-860  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-861  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-863  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-862  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-523  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-473  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-19  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-703  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-20  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-706  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-29  |p ZDB-2-LNS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-21373-2  |l DE-739  |p ZDB-2-LNS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-UBM_katkey 5778964
DE-BY-UBM_local_url https://doi.org/10.1007/978-3-030-21373-2
Verlag
DE-BY-UBR_katkey 6148596
_version_ 1823056828221620224
any_adam_object
author2 Li, Jin
Liu, Zheli
Peng, Hao
author2_role edt
edt
edt
author2_variant j l jl
z l zl
h p hp
author_GND (DE-588)1027830269
author_corporate EAI International Conference on Security and Privacy in New Computing Environments Tientsin
author_corporate_role aut
author_facet Li, Jin
Liu, Zheli
Peng, Hao
EAI International Conference on Security and Privacy in New Computing Environments Tientsin
author_sort EAI International Conference on Security and Privacy in New Computing Environments Tientsin
building Verbundindex
bvnumber BV046062587
collection ZDB-2-SCS
ZDB-2-LNS
ctrlnum (ZDB-2-SCS)9783030213732
(ZDB-2-LNS)9783030213732
(OCoLC)1111822627
(DE-599)BVBBV046062587
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-21373-2
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04313nam a2200769zcb4500</leader><controlfield tag="001">BV046062587</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200212 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190724s2019 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030213732</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-21373-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-21373-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030213732</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNS)9783030213732</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111822627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046062587</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">EAI International Conference on Security and Privacy in New Computing Environments</subfield><subfield code="n">2.</subfield><subfield code="d">2019</subfield><subfield code="c">Tientsin</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1204489726</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy in new computing environments</subfield><subfield code="b">Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings</subfield><subfield code="c">Jin Li, Zheli Liu, Hao Peng (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 745 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">284</subfield><subfield code="x">1867-8211</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2019</subfield><subfield code="z">Tientsin</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Jin</subfield><subfield code="0">(DE-588)1027830269</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Zheli</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Peng, Hao</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-21372-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-21374-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">284</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">284</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2019</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNS_2019</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031443902</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-21373-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2019 Tientsin gnd-content
genre_facet Konferenzschrift 2019 Tientsin
id DE-604.BV046062587
illustrated Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1204489726
isbn 9783030213732
issn 1867-8211
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031443902
oclc_num 1111822627
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xiv, 745 Seiten) Illustrationen
psigel ZDB-2-SCS
ZDB-2-LNS
ZDB-2-SCS_2019
ZDB-2-LNS_2019
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher Springer
record_format marc
series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
series2 Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
spellingShingle Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Systems and Data Security
Computer Communication Networks
Information Systems and Communication Service
Computer security
Information systems
subject_GND (DE-588)1071861417
title Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings
title_auth Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings
title_exact_search Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings
title_full Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings Jin Li, Zheli Liu, Hao Peng (eds.)
title_fullStr Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings Jin Li, Zheli Liu, Hao Peng (eds.)
title_full_unstemmed Security and privacy in new computing environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings Jin Li, Zheli Liu, Hao Peng (eds.)
title_short Security and privacy in new computing environments
title_sort security and privacy in new computing environments second eai international conference spnce 2019 tianjin china april 13 14 2019 proceedings
title_sub Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019 : proceedings
topic Systems and Data Security
Computer Communication Networks
Information Systems and Communication Service
Computer security
Information systems
topic_facet Systems and Data Security
Computer Communication Networks
Information Systems and Communication Service
Computer security
Information systems
Konferenzschrift 2019 Tientsin
url https://doi.org/10.1007/978-3-030-21373-2
volume_link (DE-604)BV041557366
work_keys_str_mv AT eaiinternationalconferenceonsecurityandprivacyinnewcomputingenvironmentstientsin securityandprivacyinnewcomputingenvironmentssecondeaiinternationalconferencespnce2019tianjinchinaapril13142019proceedings
AT lijin securityandprivacyinnewcomputingenvironmentssecondeaiinternationalconferencespnce2019tianjinchinaapril13142019proceedings
AT liuzheli securityandprivacyinnewcomputingenvironmentssecondeaiinternationalconferencespnce2019tianjinchinaapril13142019proceedings
AT penghao securityandprivacyinnewcomputingenvironmentssecondeaiinternationalconferencespnce2019tianjinchinaapril13142019proceedings