Security standardisation research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2015]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | Lecture Notes in Computer Science
9497 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | X, 267 Seiten Illustrationen |
ISBN: | 9783319271521 9783319271514 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-27152-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043309602 | ||
003 | DE-604 | ||
005 | 20160128 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160125s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319271521 |c Online |9 978-3-319-27152-1 | ||
020 | |a 9783319271514 |c Print |9 978-3-319-27151-4 | ||
024 | 7 | |a 10.1007/978-3-319-27152-1 |2 doi | |
035 | |a (OCoLC)934176749 | ||
035 | |a (DE-599)BVBBV043309602 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
111 | 2 | |a SSR |n 2. |d 2015 |c Tokio |j Verfasser |0 (DE-588)1079940472 |4 aut | |
245 | 1 | 0 | |a Security standardisation research |b Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings |c edited by Liqun Chen, Shin'ichiro Matsuo |
250 | |a 1st ed. | ||
264 | 1 | |a Cham |b Springer International Publishing |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a X, 267 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9497 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer science / Mathematics | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Software Engineering | |
650 | 4 | |a Data Structures | |
650 | 4 | |a Math Applications in Computer Science | |
650 | 4 | |a Informatik | |
650 | 4 | |a Mathematik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Chen, Liqun |0 (DE-588)174012950 |4 edt | |
830 | 0 | |a Lecture Notes in Computer Science |v 9497 |w (DE-604)BV014880109 |9 9497 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-27152-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730291&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028730291 |
Datensatz im Suchindex
_version_ | 1804175846581207040 |
---|---|
adam_text | SECURITY STANDARDISATION RESEARCH
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE SECOND
INTERNATIONAL CONFERENCE ON SECURITY STANDARDISATION RESEARCH, SSR 2015,
HELD IN TOKYO, JAPAN, IN DECEMBER 2015. THE 13 PAPERS PRESENTED IN THIS
VOLUME WERE CAREFULLY REVIEWED AND SELECTED FROM 18 SUBMISSIONS. THEY
ARE ORGANIZED IN TOPICAL SECTIONS NAMED: BITCOIN AND PAYMENT; PROTOCOL
AND API; ANALYSIS ON CRYPTOGRAPHIC ALGORITHM; PRIVACY; AND TRUST AND
FORMAL ANALYSIS.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Chen, Liqun |
author2_role | edt |
author2_variant | l c lc |
author_GND | (DE-588)174012950 |
author_corporate | SSR Tokio |
author_corporate_role | aut |
author_facet | Chen, Liqun SSR Tokio |
author_sort | SSR Tokio |
building | Verbundindex |
bvnumber | BV043309602 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)934176749 (DE-599)BVBBV043309602 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-27152-1 |
edition | 1st ed. |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02587nmm a2200637zcb4500</leader><controlfield tag="001">BV043309602</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160128 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160125s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319271521</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-27152-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319271514</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-27151-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-27152-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)934176749</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043309602</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">SSR</subfield><subfield code="n">2.</subfield><subfield code="d">2015</subfield><subfield code="c">Tokio</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1079940472</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security standardisation research</subfield><subfield code="b">Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings</subfield><subfield code="c">edited by Liqun Chen, Shin'ichiro Matsuo</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 267 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9497</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Math Applications in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Liqun</subfield><subfield code="0">(DE-588)174012950</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9497</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9497</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-27152-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730291&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028730291</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043309602 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:22:47Z |
institution | BVB |
institution_GND | (DE-588)1079940472 |
isbn | 9783319271521 9783319271514 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028730291 |
oclc_num | 934176749 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | X, 267 Seiten Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | SSR 2. 2015 Tokio Verfasser (DE-588)1079940472 aut Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings edited by Liqun Chen, Shin'ichiro Matsuo 1st ed. Cham Springer International Publishing [2015] © 2015 X, 267 Seiten Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9497 0302-9743 Computer science Computer communication systems Software engineering Computer security Data structures (Computer science) Data encryption (Computer science) Computer science / Mathematics Computer Science Systems and Data Security Data Encryption Computer Communication Networks Software Engineering Data Structures Math Applications in Computer Science Informatik Mathematik (DE-588)1071861417 Konferenzschrift gnd-content Chen, Liqun (DE-588)174012950 edt Lecture Notes in Computer Science 9497 (DE-604)BV014880109 9497 https://doi.org/10.1007/978-3-319-27152-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730291&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings Lecture Notes in Computer Science Computer science Computer communication systems Software engineering Computer security Data structures (Computer science) Data encryption (Computer science) Computer science / Mathematics Computer Science Systems and Data Security Data Encryption Computer Communication Networks Software Engineering Data Structures Math Applications in Computer Science Informatik Mathematik |
subject_GND | (DE-588)1071861417 |
title | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings |
title_auth | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings |
title_exact_search | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings |
title_full | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings edited by Liqun Chen, Shin'ichiro Matsuo |
title_fullStr | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings edited by Liqun Chen, Shin'ichiro Matsuo |
title_full_unstemmed | Security standardisation research Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings edited by Liqun Chen, Shin'ichiro Matsuo |
title_short | Security standardisation research |
title_sort | security standardisation research second international conference ssr 2015 tokyo japan december 15 16 2015 proceedings |
title_sub | Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, proceedings |
topic | Computer science Computer communication systems Software engineering Computer security Data structures (Computer science) Data encryption (Computer science) Computer science / Mathematics Computer Science Systems and Data Security Data Encryption Computer Communication Networks Software Engineering Data Structures Math Applications in Computer Science Informatik Mathematik |
topic_facet | Computer science Computer communication systems Software engineering Computer security Data structures (Computer science) Data encryption (Computer science) Computer science / Mathematics Computer Science Systems and Data Security Data Encryption Computer Communication Networks Software Engineering Data Structures Math Applications in Computer Science Informatik Mathematik Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-27152-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028730291&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT ssrtokio securitystandardisationresearchsecondinternationalconferencessr2015tokyojapandecember15162015proceedings AT chenliqun securitystandardisationresearchsecondinternationalconferencessr2015tokyojapandecember15162015proceedings |