Network and system security: 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2015]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | Lecture Notes in Computer Science
9408 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | XIV, 542 Seiten Illustrationen |
ISBN: | 9783319256450 9783319256443 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-25645-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209546 | ||
003 | DE-604 | ||
005 | 20200514 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319256450 |c Online |9 978-3-319-25645-0 | ||
020 | |a 9783319256443 |c Print |9 978-3-319-25644-3 | ||
024 | 7 | |a 10.1007/978-3-319-25645-0 |2 doi | |
035 | |a (OCoLC)932569425 | ||
035 | |a (DE-599)BVBBV043209546 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Network and system security |b 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings |c edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang |
250 | |a 1st ed. | ||
264 | 1 | |a Cham |b Springer International Publishing |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a XIV, 542 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9405 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Schlüsselverteilung |0 (DE-588)4304682-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 6 | |a Schlüsselverteilung |0 (DE-588)4304682-4 |D s |
689 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Qiu, Meikang |0 (DE-588)1013594762 |4 edt | |
711 | 2 | |a NSS |n 9. |d 2015 |c New York, NY |j Sonstige |0 (DE-588)1080003541 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9408 |w (DE-604)BV014880109 |9 9408 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-25645-0 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632707 |
Datensatz im Suchindex
_version_ | 1804175708643131392 |
---|---|
adam_text | NETWORK AND SYSTEM SECURITY
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
WIRELESS SECURITY AND PRIVACY
SMARTPHONE SECURITY
SYSTEMS SECURITY.-APPLICATIONS SECURITY
SECURITY MANAGEMENT
APPLIED CRYPTOGRAPHY.-CRYPTOSYSTEMS
CRYPTOGRAPHIC MECHANISMS
SECURITY MECHANISMS
MOBILE AND CLOUD SECURITY
APPLICATIONS AND NETWORK SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
NETWORK AND SYSTEM SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE 9TH INTERNATIONAL
CONFERENCE ON NETWORK AND SYSTEM SECURITY, NSS 2015, HELD IN NEW YORK
CITY, NY, USA, IN NOVEMBER 2015. THE 23 FULL PAPERS AND 18 SHORT PAPERS
PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 110 SUBMISSIONS. THE
PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON WIRELESS SECURITY AND
PRIVACY; SMARTPHONE SECURITY; SYSTEMS SECURITY; APPLICATIONS SECURITY;
SECURITY MANAGEMENT; APPLIED CRYPTOGRAPHY; CRYPTOSYSTEMS; CRYPTOGRAPHIC
MECHANISMS; SECURITY MECHANISMS; MOBILE AND CLOUD SECURITY; APPLICATIONS
AND NETWORK SECURITY.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Qiu, Meikang |
author2_role | edt |
author2_variant | m q mq |
author_GND | (DE-588)1013594762 |
author_facet | Qiu, Meikang |
building | Verbundindex |
bvnumber | BV043209546 |
classification_tum | DAT 461f DAT 050f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)932569425 (DE-599)BVBBV043209546 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-25645-0 |
edition | 1st ed. |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03864nmm a2200853zcb4500</leader><controlfield tag="001">BV043209546</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319256450</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-25645-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319256443</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-25644-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-25645-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932569425</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209546</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network and system security</subfield><subfield code="b">9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings</subfield><subfield code="c">edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 542 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9405</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverteilung</subfield><subfield code="0">(DE-588)4304682-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Schlüsselverteilung</subfield><subfield code="0">(DE-588)4304682-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qiu, Meikang</subfield><subfield code="0">(DE-588)1013594762</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">NSS</subfield><subfield code="n">9.</subfield><subfield code="d">2015</subfield><subfield code="c">New York, NY</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1080003541</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9408</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9408</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-25645-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632707</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043209546 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:35Z |
institution | BVB |
institution_GND | (DE-588)1080003541 |
isbn | 9783319256450 9783319256443 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632707 |
oclc_num | 932569425 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | XIV, 542 Seiten Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang 1st ed. Cham Springer International Publishing [2015] © 2015 XIV, 542 Seiten Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9405 0302-9743 Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Management information systems Computer Science Systems and Data Security Computer Communication Networks Data Encryption Management of Computing and Information Systems Computers and Society Informatik Schlüsselverteilung (DE-588)4304682-4 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Sicherheitsprotokoll (DE-588)4709127-7 s Malware (DE-588)4687059-3 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Schlüsselverteilung (DE-588)4304682-4 s Automatische Identifikation (DE-588)4206098-9 s DE-604 Qiu, Meikang (DE-588)1013594762 edt NSS 9. 2015 New York, NY Sonstige (DE-588)1080003541 oth Lecture Notes in Computer Science 9408 (DE-604)BV014880109 9408 https://doi.org/10.1007/978-3-319-25645-0 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings Lecture Notes in Computer Science Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Management information systems Computer Science Systems and Data Security Computer Communication Networks Data Encryption Management of Computing and Information Systems Computers and Society Informatik Schlüsselverteilung (DE-588)4304682-4 gnd Malware (DE-588)4687059-3 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Automatische Identifikation (DE-588)4206098-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4304682-4 (DE-588)4687059-3 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4206098-9 (DE-588)4709127-7 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)1071861417 |
title | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings |
title_auth | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings |
title_exact_search | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings |
title_full | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang |
title_fullStr | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang |
title_full_unstemmed | Network and system security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings edited by Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang |
title_short | Network and system security |
title_sort | network and system security 9th international conference nss 2015 new york ny usa november 3 5 2015 proceedings |
title_sub | 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Management information systems Computer Science Systems and Data Security Computer Communication Networks Data Encryption Management of Computing and Information Systems Computers and Society Informatik Schlüsselverteilung (DE-588)4304682-4 gnd Malware (DE-588)4687059-3 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Automatische Identifikation (DE-588)4206098-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Management information systems Computer Science Systems and Data Security Computer Communication Networks Data Encryption Management of Computing and Information Systems Computers and Society Informatik Schlüsselverteilung Malware Computersicherheit Rechnernetz Automatische Identifikation Sicherheitsprotokoll Kryptosystem Kryptoanalyse Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-25645-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632707&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT qiumeikang networkandsystemsecurity9thinternationalconferencenss2015newyorknyusanovember352015proceedings AT nssnewyorkny networkandsystemsecurity9thinternationalconferencenss2015newyorknyusanovember352015proceedings |