Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Dordrecht ; London
Springer
[2014]
|
Schriftenreihe: | Communications in Computer and Information Science
467 |
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHM01 FHN01 FKE01 FRO01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XVIII, 442 p. 197 illus) |
ISBN: | 9783662449660 |
DOI: | 10.1007/978-3-662-44966-0 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV043209872 | ||
003 | DE-604 | ||
005 | 20160525 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783662449660 |c Online |9 978-3-662-44966-0 | ||
024 | 7 | |a 10.1007/978-3-662-44966-0 |2 doi | |
035 | |a (OCoLC)890058913 | ||
035 | |a (DE-599)BVBBV043209872 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 |a DE-861 |a DE-M347 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Security in Computing and Communications |b Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings |c Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (Eds.) |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Dordrecht ; London |b Springer |c [2014] | |
264 | 4 | |c © 2014 | |
300 | |a 1 Online Ressource (XVIII, 442 p. 197 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in Computer and Information Science |v 467 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a E-commerce | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Delhi |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |D s |
689 | 0 | 2 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 3 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lloret Mauri, Jaime |0 (DE-588)1034755471 |4 edt | |
700 | 1 | |a Thampi, Sabu M. |0 (DE-588)1034405217 |4 edt | |
700 | 1 | |a Rawat, Danda B. |4 edt | |
700 | 1 | |a Jin, Di |4 edt | |
711 | 2 | |a International Symposium on Security in Computing and Communications |n 2. |d 2014 |c Delhi |0 (DE-588)1065078897 |4 isb | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-44965-3 |
830 | 0 | |a Communications in Computer and Information Science |v 467 |w (DE-604)BV041227480 |9 467 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-44966-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2014 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028633033 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l BFB01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-44966-0 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709576364032 |
---|---|
adam_text | SECURITY IN COMPUTING AND COMMUNICATIONS
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SECURITY AND PRIVACY IN NETWORKED SYSTEMS
AUTHENTICATION AND ACCESS CONTROL SYSTEMS
ENCRYPTION AND CRYPTOGRAPHY
SYSTEM AND NETWORK SECURITY
WORK-IN-PROGRESS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURITY IN COMPUTING AND COMMUNICATIONS
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE INTERNATIONAL
SYMPOSIUM ON SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2014, HELD
IN DELHI, INDIA, IN SEPTEMBER 2013. THE 36 REVISED FULL PAPERS PRESENTED
TOGETHER WITH 12 WORK-IN-PROGRESS PAPERS WERE CAREFULLY REVIEWED AND
SELECTED FROM 132 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL
SECTIONS ON SECURITY AND PRIVACY IN NETWORKED SYSTEMS; AUTHENTICATION
AND ACCESS CONTROL SYSTEMS; ENCRYPTION AND CRYPTOGRAPHY; SYSTEM AND
NETWORK SECURITY; WORK-IN-PROGRESS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Lloret Mauri, Jaime Thampi, Sabu M. Rawat, Danda B. Jin, Di |
author2_role | edt edt edt edt |
author2_variant | m j l mj mjl s m t sm smt d b r db dbr d j dj |
author_GND | (DE-588)1034755471 (DE-588)1034405217 |
author_facet | Lloret Mauri, Jaime Thampi, Sabu M. Rawat, Danda B. Jin, Di |
building | Verbundindex |
bvnumber | BV043209872 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)890058913 (DE-599)BVBBV043209872 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-44966-0 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04727nmm a2200877 cb4500</leader><controlfield tag="001">BV043209872</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160525 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662449660</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-44966-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-44966-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890058913</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209872</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in Computing and Communications</subfield><subfield code="b">Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings</subfield><subfield code="c">Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Dordrecht ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XVIII, 442 p. 197 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">467</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Delhi</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloret Mauri, Jaime</subfield><subfield code="0">(DE-588)1034755471</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thampi, Sabu M.</subfield><subfield code="0">(DE-588)1034405217</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rawat, Danda B.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Di</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Symposium on Security in Computing and Communications</subfield><subfield code="n">2.</subfield><subfield code="d">2014</subfield><subfield code="c">Delhi</subfield><subfield code="0">(DE-588)1065078897</subfield><subfield code="4">isb</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-44965-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">467</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">467</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2014</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633033</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-44966-0</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Delhi gnd-content |
genre_facet | Konferenzschrift 2014 Delhi |
id | DE-604.BV043209872 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
institution_GND | (DE-588)1065078897 |
isbn | 9783662449660 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633033 |
oclc_num | 890058913 |
open_access_boolean | |
owner | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-522 DE-Aug4 DE-861 DE-M347 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online Ressource (XVIII, 442 p. 197 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Communications in Computer and Information Science |
series2 | Communications in Computer and Information Science |
spelling | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (Eds.) Berlin ; Heidelberg ; New York ; Dordrecht ; London Springer [2014] © 2014 1 Online Ressource (XVIII, 442 p. 197 illus) txt rdacontent c rdamedia cr rdacarrier Communications in Computer and Information Science 467 Computer science Computer communication systems Computer security E-commerce Computer Science Systems and Data Security Computer Communication Networks e-Commerce/e-business Informatik Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Computerunterstützte Kommunikation (DE-588)4535905-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Delhi gnd-content Computersicherheit (DE-588)4274324-2 s Computerunterstützte Kommunikation (DE-588)4535905-2 s Datenschutz (DE-588)4011134-9 s World Wide Web (DE-588)4363898-3 s Kryptoanalyse (DE-588)4830502-9 s Rechnernetz (DE-588)4070085-9 s DE-604 Lloret Mauri, Jaime (DE-588)1034755471 edt Thampi, Sabu M. (DE-588)1034405217 edt Rawat, Danda B. edt Jin, Di edt International Symposium on Security in Computing and Communications 2. 2014 Delhi (DE-588)1065078897 isb Erscheint auch als Druckausgabe 978-3-662-44965-3 Communications in Computer and Information Science 467 (DE-604)BV041227480 467 https://doi.org/10.1007/978-3-662-44966-0 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings Communications in Computer and Information Science Computer science Computer communication systems Computer security E-commerce Computer Science Systems and Data Security Computer Communication Networks e-Commerce/e-business Informatik Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd World Wide Web (DE-588)4363898-3 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4363898-3 (DE-588)4535905-2 (DE-588)4070085-9 (DE-588)4011134-9 (DE-588)1071861417 |
title | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings |
title_auth | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings |
title_exact_search | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings |
title_full | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (Eds.) |
title_fullStr | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (Eds.) |
title_full_unstemmed | Security in Computing and Communications Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin (Eds.) |
title_short | Security in Computing and Communications |
title_sort | security in computing and communications second international symposium sscc 2014 delhi india september 24 27 2014 proceedings |
title_sub | Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014 : Proceedings |
topic | Computer science Computer communication systems Computer security E-commerce Computer Science Systems and Data Security Computer Communication Networks e-Commerce/e-business Informatik Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd World Wide Web (DE-588)4363898-3 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Computer science Computer communication systems Computer security E-commerce Computer Science Systems and Data Security Computer Communication Networks e-Commerce/e-business Informatik Kryptoanalyse Computersicherheit World Wide Web Computerunterstützte Kommunikation Rechnernetz Datenschutz Konferenzschrift 2014 Delhi |
url | https://doi.org/10.1007/978-3-662-44966-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633033&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT lloretmaurijaime securityincomputingandcommunicationssecondinternationalsymposiumsscc2014delhiindiaseptember24272014proceedings AT thampisabum securityincomputingandcommunicationssecondinternationalsymposiumsscc2014delhiindiaseptember24272014proceedings AT rawatdandab securityincomputingandcommunicationssecondinternationalsymposiumsscc2014delhiindiaseptember24272014proceedings AT jindi securityincomputingandcommunicationssecondinternationalsymposiumsscc2014delhiindiaseptember24272014proceedings AT internationalsymposiumonsecurityincomputingandcommunicationsdelhi securityincomputingandcommunicationssecondinternationalsymposiumsscc2014delhiindiaseptember24272014proceedings |