Applications and techniques in information security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin
Springer
[2015]
|
Schriftenreihe: | Communications in Computer and Information Science
557 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Abstract |
Beschreibung: | 1 Online Ressource (XVII, 398 Seiten, 147 illus. in color) |
ISBN: | 9783662486832 |
ISSN: | 1865-0929 |
DOI: | 10.1007/978-3-662-48683-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209903 | ||
003 | DE-604 | ||
005 | 20160708 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783662486832 |c Online |9 978-3-662-48683-2 | ||
024 | 7 | |a 10.1007/978-3-662-48683-2 |2 doi | |
035 | |a (OCoLC)932033314 | ||
035 | |a (DE-599)BVBBV043209903 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
111 | 2 | |a ATIS |n 6. |d 2015 |c Peking |j Verfasser |0 (DE-588)1081021292 |4 aut | |
245 | 1 | 0 | |a Applications and techniques in information security |b 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |c Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
264 | 1 | |a Berlin |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource (XVII, 398 Seiten, 147 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 557 |x 1865-0929 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Peking |2 gnd-content | |
700 | 1 | |a Niu, Wenjia |4 edt | |
700 | 1 | |a Li, Gang |4 edt | |
700 | 1 | |a Liu, Jiqiang |4 edt | |
700 | 1 | |a Tan, Jianlong |4 edt | |
700 | 1 | |a Guo, Li |0 (DE-588)171705777 |4 edt | |
700 | 1 | |a Han, Zhen |4 edt | |
700 | 1 | |a Batten, Lynn Margaret |d 1948- |0 (DE-588)123824710 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-48682-5 |
830 | 0 | |a Communications in Computer and Information Science |v 557 |w (DE-604)BV041227480 |9 557 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-48683-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028633063 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709627744256 |
---|---|
adam_text | APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE INTERNATIONAL
CONFERENCE ON APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS
2015, HELD IN BEIJING, CHINA, IN NOVEMBER 2015. THE 25 REVISED FULL
PAPERS AND 10 SHORT PAPERS PRESENTED WERE CAREFULLY REVIEWED AND
SELECTED FROM 103 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL
SECTIONS ONINVITED SPEECHES;CRYPTOGRAPH;EVALUATION, STANDARDS AND
PROTOCOLS;TRUST COMPUTING AND PRIVACY PROTECTION;CLOUD SECURITY AND
APPLICATIONS;TOOLS AND METHODOLOGIES;SYSTEM DESIGN AND
IMPLEMENTATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Niu, Wenjia Li, Gang Liu, Jiqiang Tan, Jianlong Guo, Li Han, Zhen Batten, Lynn Margaret 1948- |
author2_role | edt edt edt edt edt edt edt |
author2_variant | w n wn g l gl j l jl j t jt l g lg z h zh l m b lm lmb |
author_GND | (DE-588)171705777 (DE-588)123824710 |
author_corporate | ATIS Peking |
author_corporate_role | aut |
author_facet | Niu, Wenjia Li, Gang Liu, Jiqiang Tan, Jianlong Guo, Li Han, Zhen Batten, Lynn Margaret 1948- ATIS Peking |
author_sort | ATIS Peking |
building | Verbundindex |
bvnumber | BV043209903 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932033314 (DE-599)BVBBV043209903 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-48683-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03937nmm a2200769zcb4500</leader><controlfield tag="001">BV043209903</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160708 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662486832</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-48683-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-48683-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932033314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209903</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ATIS</subfield><subfield code="n">6.</subfield><subfield code="d">2015</subfield><subfield code="c">Peking</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1081021292</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applications and techniques in information security</subfield><subfield code="b">6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings</subfield><subfield code="c">Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XVII, 398 Seiten, 147 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">557</subfield><subfield code="x">1865-0929</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Niu, Wenjia</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Gang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Jiqiang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tan, Jianlong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guo, Li</subfield><subfield code="0">(DE-588)171705777</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Han, Zhen</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batten, Lynn Margaret</subfield><subfield code="d">1948-</subfield><subfield code="0">(DE-588)123824710</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-48682-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">557</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">557</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633063</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Peking gnd-content |
genre_facet | Konferenzschrift 2015 Peking |
id | DE-604.BV043209903 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
institution_GND | (DE-588)1081021292 |
isbn | 9783662486832 |
issn | 1865-0929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633063 |
oclc_num | 932033314 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (XVII, 398 Seiten, 147 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Communications in Computer and Information Science |
series2 | Communications in computer and information science |
spelling | ATIS 6. 2015 Peking Verfasser (DE-588)1081021292 aut Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) Berlin Springer [2015] © 2015 1 Online Ressource (XVII, 398 Seiten, 147 illus. in color) txt rdacontent c rdamedia cr rdacarrier Communications in computer and information science 557 1865-0929 Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik (DE-588)1071861417 Konferenzschrift 2015 Peking gnd-content Niu, Wenjia edt Li, Gang edt Liu, Jiqiang edt Tan, Jianlong edt Guo, Li (DE-588)171705777 edt Han, Zhen edt Batten, Lynn Margaret 1948- (DE-588)123824710 edt Erscheint auch als Druckausgabe 978-3-662-48682-5 Communications in Computer and Information Science 557 (DE-604)BV041227480 557 https://doi.org/10.1007/978-3-662-48683-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Communications in Computer and Information Science Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik |
subject_GND | (DE-588)1071861417 |
title | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
title_auth | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
title_exact_search | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
title_full | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
title_fullStr | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
title_full_unstemmed | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
title_short | Applications and techniques in information security |
title_sort | applications and techniques in information security 6th international conference atis 2015 beijing china november 4 6 2015 proceedings |
title_sub | 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
topic | Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik Konferenzschrift 2015 Peking |
url | https://doi.org/10.1007/978-3-662-48683-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT atispeking applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT niuwenjia applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT ligang applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT liujiqiang applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT tanjianlong applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT guoli applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT hanzhen applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT battenlynnmargaret applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings |