Security-aware device-to-device communications underlaying cellular networks:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2016]
|
Schriftenreihe: | SpringerBriefs in electrical and computer engineering
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (X, 73 Seiten, 19 illus., 18 illus. in color) |
ISBN: | 9783319324586 |
ISSN: | 2191-8112 |
DOI: | 10.1007/978-3-319-32458-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043650030 | ||
003 | DE-604 | ||
005 | 20160909 | ||
007 | cr|uuu---uuuuu | ||
008 | 160701s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319324586 |c Online |9 978-3-319-32458-6 | ||
024 | 7 | |a 10.1007/978-3-319-32458-6 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-319-32458-6 | ||
035 | |a (OCoLC)953080315 | ||
035 | |a (DE-599)BVBBV043650030 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 | ||
082 | 0 | |a 004.6 |2 23 | |
100 | 1 | |a Zhang, Aiqing |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security-aware device-to-device communications underlaying cellular networks |c Aiqing Zhang, Liang Zhou, Lei Wang |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (X, 73 Seiten, 19 illus., 18 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in electrical and computer engineering |x 2191-8112 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Informatik | |
700 | 1 | |a Zhou, Liang |e Verfasser |4 aut | |
700 | 0 | |a Wang Lei |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-32457-9 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-32458-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029063637 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-32458-6 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176397675003904 |
---|---|
any_adam_object | |
author | Zhang, Aiqing Zhou, Liang Wang Lei |
author_facet | Zhang, Aiqing Zhou, Liang Wang Lei |
author_role | aut aut aut |
author_sort | Zhang, Aiqing |
author_variant | a z az l z lz w l wl |
building | Verbundindex |
bvnumber | BV043650030 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-319-32458-6 (OCoLC)953080315 (DE-599)BVBBV043650030 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-32458-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03343nmm a2200685zc 4500</leader><controlfield tag="001">BV043650030</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160909 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160701s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319324586</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-32458-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-32458-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-32458-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953080315</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043650030</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zhang, Aiqing</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security-aware device-to-device communications underlaying cellular networks</subfield><subfield code="c">Aiqing Zhang, Liang Zhou, Lei Wang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 73 Seiten, 19 illus., 18 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in electrical and computer engineering</subfield><subfield code="x">2191-8112</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Liang</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Wang Lei</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-32457-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029063637</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-32458-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043650030 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:31:31Z |
institution | BVB |
isbn | 9783319324586 |
issn | 2191-8112 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029063637 |
oclc_num | 953080315 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
physical | 1 Online-Ressource (X, 73 Seiten, 19 illus., 18 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in electrical and computer engineering |
spelling | Zhang, Aiqing Verfasser aut Security-aware device-to-device communications underlaying cellular networks Aiqing Zhang, Liang Zhou, Lei Wang [Cham] Springer [2016] © 2016 1 Online-Ressource (X, 73 Seiten, 19 illus., 18 illus. in color) txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in electrical and computer engineering 2191-8112 Computer science Computer communication systems Computer security Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Informatik Zhou, Liang Verfasser aut Wang Lei Verfasser aut Erscheint auch als Druckausgabe 978-3-319-32457-9 https://doi.org/10.1007/978-3-319-32458-6 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Zhang, Aiqing Zhou, Liang Wang Lei Security-aware device-to-device communications underlaying cellular networks Computer science Computer communication systems Computer security Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Informatik |
title | Security-aware device-to-device communications underlaying cellular networks |
title_auth | Security-aware device-to-device communications underlaying cellular networks |
title_exact_search | Security-aware device-to-device communications underlaying cellular networks |
title_full | Security-aware device-to-device communications underlaying cellular networks Aiqing Zhang, Liang Zhou, Lei Wang |
title_fullStr | Security-aware device-to-device communications underlaying cellular networks Aiqing Zhang, Liang Zhou, Lei Wang |
title_full_unstemmed | Security-aware device-to-device communications underlaying cellular networks Aiqing Zhang, Liang Zhou, Lei Wang |
title_short | Security-aware device-to-device communications underlaying cellular networks |
title_sort | security aware device to device communications underlaying cellular networks |
topic | Computer science Computer communication systems Computer security Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Informatik |
topic_facet | Computer science Computer communication systems Computer security Electrical engineering Computer Science Computer Communication Networks Systems and Data Security Communications Engineering, Networks Informatik |
url | https://doi.org/10.1007/978-3-319-32458-6 |
work_keys_str_mv | AT zhangaiqing securityawaredevicetodevicecommunicationsunderlayingcellularnetworks AT zhouliang securityawaredevicetodevicecommunicationsunderlayingcellularnetworks AT wanglei securityawaredevicetodevicecommunicationsunderlayingcellularnetworks |