International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Ausgabe: | 1st ed. 2015 |
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
152 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XIX, 635 p. 193 illus) |
ISBN: | 9783319238296 |
ISSN: | 1867-8211 |
DOI: | 10.1007/978-3-319-23829-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209936 | ||
003 | DE-604 | ||
005 | 20160318 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319238296 |c Online |9 978-3-319-23829-6 | ||
024 | 7 | |a 10.1007/978-3-319-23829-6 |2 doi | |
035 | |a (OCoLC)932568477 | ||
035 | |a (DE-599)BVBBV043209936 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a International Conference on Security and Privacy in Communication Networks |b 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I |c edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa |
250 | |a 1st ed. 2015 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online Ressource (XIX, 635 p. 193 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 152 |x 1867-8211 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Tian, Jing |e Sonstige |4 oth | |
700 | 1 | |a Jing, Jiwu |e Sonstige |4 oth | |
700 | 1 | |a Srivatsa, Mudhakar |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-23828-9 |
830 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 152 |w (DE-604)BV041557366 |9 152 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-23829-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028633097 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23829-6 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175709736796160 |
---|---|
adam_text | INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION
NETWORKS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SECURITY AND PRIVACY IN WIRED, WIRELESS, MOBILE, HYBRID, SENSOR, AD HOC
NETWORKS
NETWORK INTRUSION DETECTION AND PREVENTION, FIREWALLS, PACKET FILTERS
MALWARE, AND DISTRIBUTED DENIAL OF SERVICE
COMMUNICATION PRIVACY AND ANONYMITY
NETWORK AND INTERNET FORENSICS TECHNIQUES
PUBLIC KEY INFRASTRUCTURES, KEY MANAGEMENT, CREDENTIAL MANAGEMENT
SECURE ROUTING, NAMING/ADDRESSING, NETWORK MANAGEMENT
SECURITY AND PRIVACY IN PERVASIVE AND UBIQUITOUS COMPUTING
SECURITY & PRIVACY FOR EMERGING TECHNOLOGIES: VOIP, PEER-TO-PEER AND
OVERLAY NETWORK SYSTEMS
SECURITY & ISOLATION IN DATA CENTER NETWORKS
SECURITY & ISOLATION IN SOFTWARE DEFINED NETWORKING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION
NETWORKS
/
: 2015
ABSTRACT / INHALTSTEXT
THIS 2-VOLUME SET CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY
IN COMMUNICATION NETWORKS, SECURECOMM 2014, HELD IN BEIJING, CHINA, IN
SEPTEMBER 2014. THE 27 REGULAR AND 17 SHORT PAPERS PRESENTED WERE
CAREFULLY REVIEWED. IT ALSO PRESENTS 22 PAPERS ACCEPTED FOR FOUR
WORKSHOPS (ATCS, SSS, SLSS, DAPRO) IN CONJUNCTION WITH THE CONFERENCE, 6
DOCTORAL SYMPOSIUM PAPERS AND 8 POSTER PAPERS. THE PAPERS ARE GROUPED IN
THE FOLLOWING TOPICS: SECURITY AND PRIVACY IN WIRED, WIRELESS, MOBILE,
HYBRID, SENSOR, AD HOC NETWORKS; NETWORK INTRUSION DETECTION AND
PREVENTION, FIREWALLS, PACKET FILTERS; MALWARE, AND DISTRIBUTED DENIAL
OF SERVICE; COMMUNICATION PRIVACY AND ANONYMITY; NETWORK AND INTERNET
FORENSICS TECHNIQUES; PUBLIC KEY INFRASTRUCTURES, KEY MANAGEMENT,
CREDENTIAL MANAGEMENT; SECURE ROUTING, NAMING/ADDRESSING, NETWORK
MANAGEMENT; SECURITY AND PRIVACY IN PERVASIVE AND UBIQUITOUS COMPUTING;
SECURITY & PRIVACY FOR EMERGING TECHNOLOGIES: VOIP, PEER-TO-PEER AND
OVERLAY NETWORK SYSTEMS; SECURITY & ISOLATION IN DATA CENTER NETWORKS;
SECURITY & ISOLATION IN SOFTWARE DEFINED NETWORKING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV043209936 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932568477 (DE-599)BVBBV043209936 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-23829-6 |
edition | 1st ed. 2015 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04375nmm a2200769zcb4500</leader><controlfield tag="001">BV043209936</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160318 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319238296</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-23829-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-23829-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932568477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209936</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">International Conference on Security and Privacy in Communication Networks</subfield><subfield code="b">10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I</subfield><subfield code="c">edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XIX, 635 p. 193 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">152</subfield><subfield code="x">1867-8211</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tian, Jing</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jing, Jiwu</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Srivatsa, Mudhakar</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-23828-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">152</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">152</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633097</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23829-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209936 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:36Z |
institution | BVB |
isbn | 9783319238296 |
issn | 1867-8211 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633097 |
oclc_num | 932568477 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (XIX, 635 p. 193 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa 1st ed. 2015 Cham Springer International Publishing 2015 1 Online Ressource (XIX, 635 p. 193 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 152 1867-8211 Computer science Computer security Systems and Data Security Informatik Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Informatik (DE-588)4026894-9 s Computersicherheit (DE-588)4274324-2 s DE-604 1\p DE-604 Tian, Jing Sonstige oth Jing, Jiwu Sonstige oth Srivatsa, Mudhakar Sonstige oth Erscheint auch als Druckausgabe 978-3-319-23828-9 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 152 (DE-604)BV041557366 152 https://doi.org/10.1007/978-3-319-23829-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Computer science Computer security Systems and Data Security Informatik Computersicherheit (DE-588)4274324-2 gnd Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4026894-9 |
title | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I |
title_auth | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I |
title_exact_search | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I |
title_full | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa |
title_fullStr | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa |
title_full_unstemmed | International Conference on Security and Privacy in Communication Networks 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I edited by Jing Tian, Jiwu Jing, Mudhakar Srivatsa |
title_short | International Conference on Security and Privacy in Communication Networks |
title_sort | international conference on security and privacy in communication networks 10th international icst conference securecomm 2014 beijing china september 24 26 2014 revised selected papers part i |
title_sub | 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I |
topic | Computer science Computer security Systems and Data Security Informatik Computersicherheit (DE-588)4274324-2 gnd Informatik (DE-588)4026894-9 gnd |
topic_facet | Computer science Computer security Systems and Data Security Informatik Computersicherheit |
url | https://doi.org/10.1007/978-3-319-23829-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633097&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041557366 |
work_keys_str_mv | AT tianjing internationalconferenceonsecurityandprivacyincommunicationnetworks10thinternationalicstconferencesecurecomm2014beijingchinaseptember24262014revisedselectedpapersparti AT jingjiwu internationalconferenceonsecurityandprivacyincommunicationnetworks10thinternationalicstconferencesecurecomm2014beijingchinaseptember24262014revisedselectedpapersparti AT srivatsamudhakar internationalconferenceonsecurityandprivacyincommunicationnetworks10thinternationalicstconferencesecurecomm2014beijingchinaseptember24262014revisedselectedpapersparti |