Codes, Cryptology, and Information Security: First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9084 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XXVI, 375 p. 58 illus) |
ISBN: | 9783319186818 9783319186801 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-18681-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042592292 | ||
003 | DE-604 | ||
005 | 20150709 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150602s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319186818 |c Online |9 978-3-319-18681-8 | ||
020 | |a 9783319186801 |c Print |9 978-3-319-18680-1 | ||
024 | 7 | |a 10.1007/978-3-319-18681-8 |2 doi | |
035 | |a (OCoLC)910742362 | ||
035 | |a (DE-599)BVBBV042592292 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Codes, Cryptology, and Information Security |b First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger |c edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi |
264 | 1 | |a Cham |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XXVI, 375 p. 58 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9084 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Computer software | |
650 | 4 | |a Computational complexity | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Discrete Mathematics in Computer Science | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Hajji, Said el |e Sonstige |4 oth | |
711 | 2 | |a C2SI |n 1. |d 2015 |c Rabat |j Sonstige |0 (DE-588)1071074717 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9084 |w (DE-604)BV014880109 |9 9084 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-18681-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025504&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028025504 |
Datensatz im Suchindex
_version_ | 1804174755190800384 |
---|---|
adam_text | CODES, CRYPTOLOGY, AND INFORMATION SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE FIRST INTERNATIONAL
CONFERENCE ON CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2015,
HELD IN RABAT, MOROCCO, IN MAY 2015. THE 22 REGULAR PAPERS PRESENTED
TOGETHER WITH 8 INVITED TALKS WERE CAREFULLY REVIEWED AND SELECTED FROM
59 SUBMISSIONS. THE FIRST AIM OF THIS CONFERENCE IS TO PAY HOMAGE TO
THIERRY BERGER FOR HIS VALUABLE CONTRIBUTION IN TEACHING AND
DISSEMINATING KNOWLEDGE IN CODING THEORY AND CRYPTOGRAPHY IN MOROCCO
SINCE 2003. THE SECOND AIM OF THE CONFERENCE IS TO PROVIDE AN
INTERNATIONAL FORUM FOR RESEARCHERS FROM ACADEMIA AND PRACTITIONERS FROM
INDUSTRY FROM ALL OVER THE WORLD FOR DISCUSSION OF ALL FORMS OF
CRYPTOLOGY, CODING THEORY AND INFORMATION SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV042592292 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)910742362 (DE-599)BVBBV042592292 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-18681-8 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02475nmm a2200577zcb4500</leader><controlfield tag="001">BV042592292</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150709 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150602s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319186818</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-18681-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319186801</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-18680-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-18681-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)910742362</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042592292</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Codes, Cryptology, and Information Security</subfield><subfield code="b">First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger</subfield><subfield code="c">edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXVI, 375 p. 58 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9084</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Discrete Mathematics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hajji, Said el</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">C2SI</subfield><subfield code="n">1.</subfield><subfield code="d">2015</subfield><subfield code="c">Rabat</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1071074717</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9084</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9084</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-18681-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025504&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028025504</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042592292 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:05:26Z |
institution | BVB |
institution_GND | (DE-588)1071074717 |
isbn | 9783319186818 9783319186801 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028025504 |
oclc_num | 910742362 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XXVI, 375 p. 58 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi Cham Springer 2015 1 Online-Ressource (XXVI, 375 p. 58 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9084 0302-9743 Computer science Data protection Data encryption (Computer science) Coding theory Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Coding and Information Theory Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Informatik (DE-588)1071861417 Konferenzschrift gnd-content Hajji, Said el Sonstige oth C2SI 1. 2015 Rabat Sonstige (DE-588)1071074717 oth Lecture Notes in Computer Science 9084 (DE-604)BV014880109 9084 https://doi.org/10.1007/978-3-319-18681-8 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025504&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Coding theory Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Coding and Information Theory Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Informatik |
subject_GND | (DE-588)1071861417 |
title | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger |
title_auth | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger |
title_exact_search | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger |
title_full | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi |
title_fullStr | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi |
title_full_unstemmed | Codes, Cryptology, and Information Security First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi |
title_short | Codes, Cryptology, and Information Security |
title_sort | codes cryptology and information security first international conference c2si 2015 rabat morocco may 26 28 2015 proceedings in honor of thierry berger |
title_sub | First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger |
topic | Computer science Data protection Data encryption (Computer science) Coding theory Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Coding and Information Theory Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Informatik |
topic_facet | Computer science Data protection Data encryption (Computer science) Coding theory Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Coding and Information Theory Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Informatik Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-18681-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028025504&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT hajjisaidel codescryptologyandinformationsecurityfirstinternationalconferencec2si2015rabatmoroccomay26282015proceedingsinhonorofthierryberger AT c2sirabat codescryptologyandinformationsecurityfirstinternationalconferencec2si2015rabatmoroccomay26282015proceedingsinhonorofthierryberger |