Innovative Security Solutions for Information Technology and Communications: 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2015]
|
Schriftenreihe: | Lecture Notes in Computer Science
9522 |
Schlagworte: | |
Online-Zugang: | UBR01 UBT01 Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XXIV, 281 Seiten) 88 Illustrationen (farbig) |
ISBN: | 9783319271798 9783319271781 |
DOI: | 10.1007/978-3-319-27179-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408641 | ||
003 | DE-604 | ||
005 | 20160902 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319271798 |c Online |9 978-3-319-27179-8 | ||
020 | |a 9783319271781 |c Print |9 978-3-319-27178-1 | ||
024 | 7 | |a 10.1007/978-3-319-27179-8 |2 doi | |
035 | |a (OCoLC)936828055 | ||
035 | |a (DE-599)BVBBV043408641 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-861 |a DE-860 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Innovative Security Solutions for Information Technology and Communications |b 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers |c Ion Bica, David Naccache, Emil Simion (eds.) |
264 | 1 | |a Cham |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online-Ressource (XXIV, 281 Seiten) |b 88 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9522 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Information storage and retrieval | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationstechnik |0 (DE-588)4031888-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 1 | |a Kommunikationstechnik |0 (DE-588)4031888-6 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bica, Ion |4 edt | |
700 | 1 | |a Naccache, David |d 1967- |0 (DE-588)122756436 |4 edt | |
700 | 1 | |a Simion, Emil |4 edt | |
711 | 2 | |a SECITC |n 8. |d 2015 |c Bukarest |0 (DE-588)1081943262 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9522 |w (DE-604)BV014880109 |9 9522 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-27179-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028826988 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-27179-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-27179-8 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175996870459392 |
---|---|
adam_text | INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND
COMMUNICATIONS
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SECURITY FOR
INFORMATION TECHNOLOGY AND COMMUNICATIONS, SECITC 2015, HELD IN
BUCHAREST, ROMANIA, IN JUNE 2015. THE 17 REVISED FULL PAPERS WERE
CAREFULLY REVIEWED AND SELECTED FROM 36 SUBMISSIONS. IN ADDITION WITH 5
INVITED TALKS THE PAPERS COVER TOPICS SUCH AS CRYPTOGRAPHIC ALGORITHMS
AND PROTOCOLS, SECURITY TECHNOLOGIES FOR IT&C, INFORMATION SECURITY
MANAGEMENT, CYBER DEFENSE, AND DIGITAL FORENSICS.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND
COMMUNICATIONS
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
AUTHENTICATED-ENCRYPTION: SECURITY NOTIONS, DESIGNS AND APPLICATIONS
NEW RESULTS ON IDENTITY-BASED ENCRYPTION FROM QUADRATIC RESIDUOSITY
EFFICIENT TECHNIQUES FOR EXTRACTING SECRETS FROM ELECTRONIC DEVICES
SECURE AND TRUSTED APPLICATION EXECUTION ON EMBEDDED DEVICES
A NUMBER-THEORETIC ERROR-CORRECTING CODE
FULL DUPLEX OTP CRYPTOSYSTEM BASED ON DNA KEY FOR TEXT TRANSMISSIONS
EVALUATION OF LIGHTWEIGHT BLOCK CIPHERS FOR EMBEDDED SYSTEMS
SCA RESISTANCE ANALYSIS ON FPGA IMPLEMENTATIONS OF SPONGE BASED
MAC-PHOTON
A NOVEL FAST AND SECURE CHAOS-BASED ALGORITHM FOR IMAGE ENCRYPTION
A NOVEL KEY MANAGEMENT FOR VIRTUALLY LIMITLESS KEY SIZE
EFFICIENT MONTGOMERY MULTIPLICATION ON GPUS
APPLYING CRYPTOGRAPHIC ACCELERATION TECHNIQUES TO ERROR CORRECTION
A COOPERATIVE BLACK HOLE NODE DETECTION AND MITIGATION APPROACH FOR
MANETS
UP-HIGH TO DOWN-LOW: APPLYING MACHINE LEARNING TO AN EXPLOIT DATABASE
DETECTING COMPUTERS IN THE CYBER SPACE MALICIOUSLY EXPLOITED AS SSH
PROXIES
ON A LIGHTWEIGHT AUTHENTICATION PROTOCOL FOR RFID
SPAM FILTERING USING AUTOMATED CLASSIFYING SERVICES OVER A CLOUD
COMPUTING INFRASTRUCTURE
CONTRIBUTIONS TO STEGANOGRAPHIC TECHNIQUES ON MOBILE DEVICES
SECURE IMPLEMENTATION OF STREAM CIPHER: TRIVIUM
FAST SEARCHING IN IMAGE DATABASES USING MULTI-HASH ROBUST FINGERPRINTING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Bica, Ion Naccache, David 1967- Simion, Emil |
author2_role | edt edt edt |
author2_variant | i b ib d n dn e s es |
author_GND | (DE-588)122756436 |
author_facet | Bica, Ion Naccache, David 1967- Simion, Emil |
building | Verbundindex |
bvnumber | BV043408641 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)936828055 (DE-599)BVBBV043408641 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-27179-8 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03821nmm a2200805zcb4500</leader><controlfield tag="001">BV043408641</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160902 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319271798</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-27179-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319271781</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-27178-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-27179-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936828055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408641</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Innovative Security Solutions for Information Technology and Communications</subfield><subfield code="b">8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers</subfield><subfield code="c">Ion Bica, David Naccache, Emil Simion (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIV, 281 Seiten)</subfield><subfield code="b">88 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9522</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationstechnik</subfield><subfield code="0">(DE-588)4031888-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationstechnik</subfield><subfield code="0">(DE-588)4031888-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bica, Ion</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Naccache, David</subfield><subfield code="d">1967-</subfield><subfield code="0">(DE-588)122756436</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Simion, Emil</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SECITC</subfield><subfield code="n">8.</subfield><subfield code="d">2015</subfield><subfield code="c">Bukarest</subfield><subfield code="0">(DE-588)1081943262</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9522</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9522</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-27179-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028826988</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-27179-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-27179-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043408641 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:25:10Z |
institution | BVB |
institution_GND | (DE-588)1081943262 |
isbn | 9783319271798 9783319271781 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028826988 |
oclc_num | 936828055 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
owner_facet | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
physical | 1 Online-Ressource (XXIV, 281 Seiten) 88 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers Ion Bica, David Naccache, Emil Simion (eds.) Cham Springer [2015] © 2015 1 Online-Ressource (XXIV, 281 Seiten) 88 Illustrationen (farbig) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9522 Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Information storage and retrieval Computer Science Systems and Data Security Information Storage and Retrieval Information Systems Applications (incl. Internet) Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Informatik Informationstechnik (DE-588)4026926-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kommunikationstechnik (DE-588)4031888-6 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Informationstechnik (DE-588)4026926-7 s Kommunikationstechnik (DE-588)4031888-6 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptologie (DE-588)4033329-2 s DE-604 Bica, Ion edt Naccache, David 1967- (DE-588)122756436 edt Simion, Emil edt SECITC 8. 2015 Bukarest (DE-588)1081943262 oth Lecture Notes in Computer Science 9522 (DE-604)BV014880109 9522 https://doi.org/10.1007/978-3-319-27179-8 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers Lecture Notes in Computer Science Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Information storage and retrieval Computer Science Systems and Data Security Information Storage and Retrieval Information Systems Applications (incl. Internet) Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Informatik Informationstechnik (DE-588)4026926-7 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Kommunikationstechnik (DE-588)4031888-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4031888-6 (DE-588)4274324-2 (DE-588)1071861417 |
title | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers |
title_auth | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers |
title_exact_search | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers |
title_full | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers Ion Bica, David Naccache, Emil Simion (eds.) |
title_fullStr | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers Ion Bica, David Naccache, Emil Simion (eds.) |
title_full_unstemmed | Innovative Security Solutions for Information Technology and Communications 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers Ion Bica, David Naccache, Emil Simion (eds.) |
title_short | Innovative Security Solutions for Information Technology and Communications |
title_sort | innovative security solutions for information technology and communications 8th international conference secitc 2015 bucharest romania june 11 12 2015 revised selected papers |
title_sub | 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015 : Revised Selected Papers |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Information storage and retrieval Computer Science Systems and Data Security Information Storage and Retrieval Information Systems Applications (incl. Internet) Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Informatik Informationstechnik (DE-588)4026926-7 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Kommunikationstechnik (DE-588)4031888-6 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Information storage and retrieval Computer Science Systems and Data Security Information Storage and Retrieval Information Systems Applications (incl. Internet) Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Informatik Informationstechnik Kryptologie Datensicherung Kommunikationstechnik Computersicherheit Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-27179-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826988&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT bicaion innovativesecuritysolutionsforinformationtechnologyandcommunications8thinternationalconferencesecitc2015bucharestromaniajune11122015revisedselectedpapers AT naccachedavid innovativesecuritysolutionsforinformationtechnologyandcommunications8thinternationalconferencesecitc2015bucharestromaniajune11122015revisedselectedpapers AT simionemil innovativesecuritysolutionsforinformationtechnologyandcommunications8thinternationalconferencesecitc2015bucharestromaniajune11122015revisedselectedpapers AT secitcbukarest innovativesecuritysolutionsforinformationtechnologyandcommunications8thinternationalconferencesecitc2015bucharestromaniajune11122015revisedselectedpapers |