Information systems security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2015]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | Lecture Notes in Computer Science
9478 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | XVI, 584 Seiten Illustrationen |
ISBN: | 9783319269610 9783319269603 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-26961-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043309601 | ||
003 | DE-604 | ||
005 | 20200514 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160125s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319269610 |c Online |9 978-3-319-26961-0 | ||
020 | |a 9783319269603 |c Print |9 978-3-319-26960-3 | ||
024 | 7 | |a 10.1007/978-3-319-26961-0 |2 doi | |
035 | |a (OCoLC)934192068 | ||
035 | |a (DE-599)BVBBV043309601 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 259f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Information systems security |b 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings |c edited by Sushil Jajodia, Chandan Mazumdar |
250 | |a 1st ed. | ||
264 | 1 | |a Cham |b Springer International Publishing |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a XVI, 584 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9478 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 3 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 4 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Jajodia, Sushil |d 1947- |0 (DE-588)120551683 |4 edt | |
711 | 2 | |a ICISS |n 11. |d 2015 |c Kalkutta |j Sonstige |0 (DE-588)1079189378 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9478 |w (DE-604)BV014880109 |9 9478 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-26961-0 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028730290 |
Datensatz im Suchindex
_version_ | 1804175846616858624 |
---|---|
adam_text | INFORMATION SYSTEMS SECURITY
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
ACCESS CONTROL
ATTACKS AND MITIGATION
CLOUD SECURITY
CRYPTO SYSTEMS AND PROTOCOLS
INFORMATION FLOW CONTROL
SENSOR NETWORKS AND COGNITIVE RADIO
WATERMARKING AND STEGANOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION SYSTEMS SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 11TH INTERNATIONAL
CONFERENCE ON INFORMATION SYSTEMS SECURITY, ICISS 2015, HELD IN KOLKATA,
INDIA, IN DECEMBER 2015. THE 24 REVISED FULL PAPERS AND 8 SHORT PAPERS
PRESENTED TOGETHER WITH 4 INVITED PAPERS WERE CAREFULLY REVIEWED AND
SELECTED FROM 133 SUBMISSIONS. THE PAPERS ADDRESS THE FOLLOWING TOPICS:
ACCESS CONTROL; ATTACKS AND MITIGATION; CLOUD SECURITY; CRYPTO SYSTEMS
AND PROTOCOLS; INFORMATION FLOW CONTROL; SENSOR NETWORKS AND COGNITIVE
RADIO; AND WATERMARKING AND STEGANOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Jajodia, Sushil 1947- |
author2_role | edt |
author2_variant | s j sj |
author_GND | (DE-588)120551683 |
author_facet | Jajodia, Sushil 1947- |
building | Verbundindex |
bvnumber | BV043309601 |
classification_tum | DAT 465f DAT 050f DAT 259f DAT 461f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)934192068 (DE-599)BVBBV043309601 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-26961-0 |
edition | 1st ed. |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04605nmm a2201045zcb4500</leader><controlfield tag="001">BV043309601</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160125s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319269610</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-26961-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319269603</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-26960-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-26961-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)934192068</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043309601</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 259f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings</subfield><subfield code="c">edited by Sushil Jajodia, Chandan Mazumdar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 584 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9478</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICISS</subfield><subfield code="n">11.</subfield><subfield code="d">2015</subfield><subfield code="c">Kalkutta</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1079189378</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9478</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9478</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-26961-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028730290</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043309601 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:22:47Z |
institution | BVB |
institution_GND | (DE-588)1079189378 |
isbn | 9783319269610 9783319269603 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028730290 |
oclc_num | 934192068 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | XVI, 584 Seiten Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings edited by Sushil Jajodia, Chandan Mazumdar 1st ed. Cham Springer International Publishing [2015] © 2015 XVI, 584 Seiten Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9478 0302-9743 Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Rechnernetz (DE-588)4070085-9 s Informationssystem (DE-588)4072806-7 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Kryptologie (DE-588)4033329-2 s Verteiltes System (DE-588)4238872-7 s Anwendungssystem (DE-588)4139375-2 s Kryptosystem (DE-588)4209132-9 s Jajodia, Sushil 1947- (DE-588)120551683 edt ICISS 11. 2015 Kalkutta Sonstige (DE-588)1079189378 oth Lecture Notes in Computer Science 9478 (DE-604)BV014880109 9478 https://doi.org/10.1007/978-3-319-26961-0 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings Lecture Notes in Computer Science Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd Kryptologie (DE-588)4033329-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Verteiltes System (DE-588)4238872-7 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Authentifikation (DE-588)4330656-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4072806-7 (DE-588)4033329-2 (DE-588)4139375-2 (DE-588)4238872-7 (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4330656-1 (DE-588)4070085-9 (DE-588)1071861417 |
title | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings |
title_auth | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings |
title_exact_search | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings |
title_full | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings edited by Sushil Jajodia, Chandan Mazumdar |
title_fullStr | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings edited by Sushil Jajodia, Chandan Mazumdar |
title_full_unstemmed | Information systems security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings edited by Sushil Jajodia, Chandan Mazumdar |
title_short | Information systems security |
title_sort | information systems security 11th international conference iciss 2015 kolkata india december 16 20 2015 proceedings |
title_sub | 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd Kryptologie (DE-588)4033329-2 gnd Anwendungssystem (DE-588)4139375-2 gnd Verteiltes System (DE-588)4238872-7 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Authentifikation (DE-588)4330656-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung Informationssystem Kryptologie Anwendungssystem Verteiltes System Zugriffskontrolle Privatsphäre Kryptosystem Computersicherheit Authentifikation Rechnernetz Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-26961-0 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730290&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT jajodiasushil informationsystemssecurity11thinternationalconferenceiciss2015kolkataindiadecember16202015proceedings AT icisskalkutta informationsystemssecurity11thinternationalconferenceiciss2015kolkataindiadecember16202015proceedings |