Network and system security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2016]
|
Schriftenreihe: | Lecture Notes in Computer Science
9955 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource XIV, 540 Seiten Illustrationen, Diagramme |
ISBN: | 9783319462981 9783319462974 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-46298-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043831464 | ||
003 | DE-604 | ||
005 | 20161026 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 161018s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319462981 |c Online |9 978-3-319-46298-1 | ||
020 | |a 9783319462974 |c Print |9 978-3-319-46297-4 | ||
024 | 7 | |a 10.1007/978-3-319-46298-1 |2 doi | |
035 | |a (ZDB-2-SCS)9783319462981 | ||
035 | |a (ZDB-2-LNC)9783319462981 | ||
035 | |a (OCoLC)960012928 | ||
035 | |a (DE-599)BVBBV043831464 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a International Conference on Network and System Security |n 10. |d 2016 |c Taipeh |j Verfasser |0 (DE-588)1116736519 |4 aut | |
245 | 1 | 0 | |a Network and system security |b 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings |c Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource XIV, 540 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 9955 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverteilung |0 (DE-588)4304682-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2016 |z Taipeh |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 6 | |a Schlüsselverteilung |0 (DE-588)4304682-4 |D s |
689 | 0 | 7 | |a Automatische Identifikation |0 (DE-588)4206098-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chen, Jiageng |d 1874-1961 |0 (DE-588)118871919 |4 edt | |
830 | 0 | |a Lecture Notes in Computer Science |v 9955 |w (DE-604)BV014880109 |9 9955 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-46298-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029242236 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l HTW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2016 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-46298-1 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176694438789120 |
---|---|
any_adam_object | |
author2 | Chen, Jiageng 1874-1961 |
author2_role | edt |
author2_variant | j c jc |
author_GND | (DE-588)118871919 |
author_corporate | International Conference on Network and System Security Taipeh |
author_corporate_role | aut |
author_facet | Chen, Jiageng 1874-1961 International Conference on Network and System Security Taipeh |
author_sort | International Conference on Network and System Security Taipeh |
building | Verbundindex |
bvnumber | BV043831464 |
classification_tum | DAT 000 DAT 461f DAT 050f DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783319462981 (ZDB-2-LNC)9783319462981 (OCoLC)960012928 (DE-599)BVBBV043831464 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-46298-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05407nmm a2201081zcb4500</leader><controlfield tag="001">BV043831464</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161026 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161018s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319462981</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-46298-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319462974</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-46297-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-46298-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319462981</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319462981</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960012928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043831464</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">International Conference on Network and System Security</subfield><subfield code="n">10.</subfield><subfield code="d">2016</subfield><subfield code="c">Taipeh</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1116736519</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network and system security</subfield><subfield code="b">10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings</subfield><subfield code="c">Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XIV, 540 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9955</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverteilung</subfield><subfield code="0">(DE-588)4304682-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Taipeh</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Schlüsselverteilung</subfield><subfield code="0">(DE-588)4304682-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Jiageng</subfield><subfield code="d">1874-1961</subfield><subfield code="0">(DE-588)118871919</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9955</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9955</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029242236</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-46298-1</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2016 Taipeh gnd-content |
genre_facet | Konferenzschrift 2016 Taipeh |
id | DE-604.BV043831464 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:36:15Z |
institution | BVB |
institution_GND | (DE-588)1116736519 |
isbn | 9783319462981 9783319462974 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029242236 |
oclc_num | 960012928 |
open_access_boolean | |
owner | DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-706 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-739 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource XIV, 540 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2016 ZDB-2-LNC ZDB-2-LNC_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | International Conference on Network and System Security 10. 2016 Taipeh Verfasser (DE-588)1116736519 aut Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) [Cham] Springer [2016] © 2016 1 Online-Ressource XIV, 540 Seiten Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science Volume 9955 0302-9743 Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Computers and Society Information Systems and Communication Service Informatik Malware (DE-588)4687059-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Schlüsselverteilung (DE-588)4304682-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2016 Taipeh gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Sicherheitsprotokoll (DE-588)4709127-7 s Malware (DE-588)4687059-3 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Schlüsselverteilung (DE-588)4304682-4 s Automatische Identifikation (DE-588)4206098-9 s DE-604 Chen, Jiageng 1874-1961 (DE-588)118871919 edt Lecture Notes in Computer Science 9955 (DE-604)BV014880109 9955 https://doi.org/10.1007/978-3-319-46298-1 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings Lecture Notes in Computer Science Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Computers and Society Information Systems and Communication Service Informatik Malware (DE-588)4687059-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Schlüsselverteilung (DE-588)4304682-4 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Automatische Identifikation (DE-588)4206098-9 gnd Kryptosystem (DE-588)4209132-9 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4687059-3 (DE-588)4830502-9 (DE-588)4304682-4 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)4206098-9 (DE-588)4209132-9 (DE-588)4070085-9 (DE-588)1071861417 |
title | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings |
title_auth | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings |
title_exact_search | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings |
title_full | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) |
title_fullStr | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) |
title_full_unstemmed | Network and system security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) |
title_short | Network and system security |
title_sort | network and system security 10th international conference nss 2016 taipei taiwan september 28 30 2016 proceedings |
title_sub | 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Computers and Society Information Systems and Communication Service Informatik Malware (DE-588)4687059-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Schlüsselverteilung (DE-588)4304682-4 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Automatische Identifikation (DE-588)4206098-9 gnd Kryptosystem (DE-588)4209132-9 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Computers and Society Information Systems and Communication Service Informatik Malware Kryptoanalyse Schlüsselverteilung Computersicherheit Sicherheitsprotokoll Automatische Identifikation Kryptosystem Rechnernetz Konferenzschrift 2016 Taipeh |
url | https://doi.org/10.1007/978-3-319-46298-1 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT internationalconferenceonnetworkandsystemsecuritytaipeh networkandsystemsecurity10thinternationalconferencenss2016taipeitaiwanseptember28302016proceedings AT chenjiageng networkandsystemsecurity10thinternationalconferencenss2016taipeitaiwanseptember28302016proceedings |