Chaos-based cryptography: theory, algorithms and applications
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Studies in computational intelligence
354 |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FHA01 FHI01 FHN01 FHR01 FKE01 FWS01 FWS02 Volltext |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9783642205422 |
DOI: | 10.1007/978-3-642-20542-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV040125066 | ||
003 | DE-604 | ||
005 | 20140807 | ||
007 | cr|uuu---uuuuu | ||
008 | 120509s2011 |||| o||u| ||||||eng d | ||
020 | |a 9783642205422 |c Online |9 978-3-642-20542-2 | ||
024 | 7 | |a 10.1007/978-3-642-20542-2 |2 doi | |
035 | |a (OCoLC)753268663 | ||
035 | |a (DE-599)BVBBV040125066 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-862 |a DE-634 |a DE-898 |a DE-Aug4 |a DE-92 |a DE-1043 |a DE-859 |a DE-573 | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
245 | 1 | 0 | |a Chaos-based cryptography |b theory, algorithms and applications |c Ljupco Kocarev ..., eds. |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Studies in computational intelligence |v 354 | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 4 | |a Engineering | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 0 | 7 | |a Chaotisches System |0 (DE-588)4316104-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Chaotisches System |0 (DE-588)4316104-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Kocarev, Ljupčo |d 1955- |0 (DE-588)173593712 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-642-20541-5 |
830 | 0 | |a Studies in computational intelligence |v 354 |w (DE-604)BV020822171 |9 354 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-20542-2 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-024982352 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-20542-2 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 435895 |
---|---|
_version_ | 1824554197926805505 |
any_adam_object | |
author2 | Kocarev, Ljupčo 1955- |
author2_role | edt |
author2_variant | l k lk |
author_GND | (DE-588)173593712 |
author_facet | Kocarev, Ljupčo 1955- |
building | Verbundindex |
bvnumber | BV040125066 |
classification_rvk | ST 300 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)753268663 (DE-599)BVBBV040125066 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-20542-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03050nmm a2200661zcb4500</leader><controlfield tag="001">BV040125066</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140807 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">120509s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642205422</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-20542-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-20542-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)753268663</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040125066</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Chaos-based cryptography</subfield><subfield code="b">theory, algorithms and applications</subfield><subfield code="c">Ljupco Kocarev ..., eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">354</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chaotisches System</subfield><subfield code="0">(DE-588)4316104-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chaotisches System</subfield><subfield code="0">(DE-588)4316104-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kocarev, Ljupčo</subfield><subfield code="d">1955-</subfield><subfield code="0">(DE-588)173593712</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-642-20541-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Studies in computational intelligence</subfield><subfield code="v">354</subfield><subfield code="w">(DE-604)BV020822171</subfield><subfield code="9">354</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024982352</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-20542-2</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV040125066 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T06:47:57Z |
institution | BVB |
isbn | 9783642205422 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024982352 |
oclc_num | 753268663 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-898 DE-BY-UBR DE-Aug4 DE-92 DE-1043 DE-859 DE-573 |
owner_facet | DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-634 DE-898 DE-BY-UBR DE-Aug4 DE-92 DE-1043 DE-859 DE-573 |
physical | 1 Online-Ressource |
psigel | ZDB-2-ENG |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Studies in computational intelligence |
series2 | Studies in computational intelligence |
spellingShingle | Chaos-based cryptography theory, algorithms and applications Studies in computational intelligence Ingenieurwissenschaften Künstliche Intelligenz Engineering Data structures (Computer science) Data encryption (Computer science) Artificial intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Data Encryption Data Structures, Cryptology and Information Theory Chaotisches System (DE-588)4316104-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4316104-2 (DE-588)4033329-2 (DE-588)4143413-4 |
title | Chaos-based cryptography theory, algorithms and applications |
title_auth | Chaos-based cryptography theory, algorithms and applications |
title_exact_search | Chaos-based cryptography theory, algorithms and applications |
title_full | Chaos-based cryptography theory, algorithms and applications Ljupco Kocarev ..., eds. |
title_fullStr | Chaos-based cryptography theory, algorithms and applications Ljupco Kocarev ..., eds. |
title_full_unstemmed | Chaos-based cryptography theory, algorithms and applications Ljupco Kocarev ..., eds. |
title_short | Chaos-based cryptography |
title_sort | chaos based cryptography theory algorithms and applications |
title_sub | theory, algorithms and applications |
topic | Ingenieurwissenschaften Künstliche Intelligenz Engineering Data structures (Computer science) Data encryption (Computer science) Artificial intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Data Encryption Data Structures, Cryptology and Information Theory Chaotisches System (DE-588)4316104-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Ingenieurwissenschaften Künstliche Intelligenz Engineering Data structures (Computer science) Data encryption (Computer science) Artificial intelligence Computational Intelligence Artificial Intelligence (incl. Robotics) Data Encryption Data Structures, Cryptology and Information Theory Chaotisches System Kryptologie Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-642-20542-2 |
volume_link | (DE-604)BV020822171 |
work_keys_str_mv | AT kocarevljupco chaosbasedcryptographytheoryalgorithmsandapplications |