Security in computing and communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer
[2016]
|
Schriftenreihe: | Communications in Computer and Information Science
625 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XXII, 474 Seiten, 179 illus) |
ISBN: | 9789811027383 |
ISSN: | 1865-0929 |
DOI: | 10.1007/978-981-10-2738-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043831542 | ||
003 | DE-604 | ||
005 | 20161216 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 161018s2016 |||| o||u| ||||||eng d | ||
020 | |a 9789811027383 |c Online |9 978-981-10-2738-3 | ||
024 | 7 | |a 10.1007/978-981-10-2738-3 |2 doi | |
035 | |a (ZDB-2-SCS)9789811027383 | ||
035 | |a (OCoLC)960002417 | ||
035 | |a (DE-599)BVBBV043831542 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
111 | 2 | |a SSCC |n 4. |d 2016 |c Jaipur |j Verfasser |0 (DE-588)1116301768 |4 aut | |
245 | 1 | 0 | |a Security in computing and communications |b 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings |c Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) |
264 | 1 | |a Singapore |b Springer |c [2016] | |
300 | |a 1 Online-Ressource (XXII, 474 Seiten, 179 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 625 |x 1865-0929 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Structures | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2016 |z Jaipur |2 gnd-content | |
700 | 1 | |a Mueller, Peter |e Sonstige |4 oth | |
700 | 1 | |a Thampi, Sabu M. |e Sonstige |0 (DE-588)1034405217 |4 oth | |
700 | 1 | |a Bhuiyan, Md Zakirul Alam |e Sonstige |4 oth | |
700 | 1 | |a Ko, Ryan |e Sonstige |4 oth | |
700 | 1 | |a Doss, Robin |e Sonstige |0 (DE-588)107496697X |4 oth | |
700 | 1 | |a Alcaraz Calero, Jose M. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-981-10-2737-6 |
830 | 0 | |a Communications in Computer and Information Science |v 625 |w (DE-604)BV041227480 |9 625 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-10-2738-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029242314 | ||
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-10-2738-3 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176694628581376 |
---|---|
any_adam_object | |
author_GND | (DE-588)1034405217 (DE-588)107496697X |
author_corporate | SSCC Jaipur |
author_corporate_role | aut |
author_facet | SSCC Jaipur |
author_sort | SSCC Jaipur |
building | Verbundindex |
bvnumber | BV043831542 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9789811027383 (OCoLC)960002417 (DE-599)BVBBV043831542 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-981-10-2738-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03986nmm a2200781zcb4500</leader><controlfield tag="001">BV043831542</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161216 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161018s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811027383</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-10-2738-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-10-2738-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789811027383</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)960002417</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043831542</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">SSCC</subfield><subfield code="n">4.</subfield><subfield code="d">2016</subfield><subfield code="c">Jaipur</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1116301768</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in computing and communications</subfield><subfield code="b">4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings</subfield><subfield code="c">Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXII, 474 Seiten, 179 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">625</subfield><subfield code="x">1865-0929</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Jaipur</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mueller, Peter</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thampi, Sabu M.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1034405217</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhuiyan, Md Zakirul Alam</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ko, Ryan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Doss, Robin</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)107496697X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alcaraz Calero, Jose M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-981-10-2737-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">625</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">625</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029242314</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-10-2738-3</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2016 Jaipur gnd-content |
genre_facet | Konferenzschrift 2016 Jaipur |
id | DE-604.BV043831542 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:36:15Z |
institution | BVB |
institution_GND | (DE-588)1116301768 |
isbn | 9789811027383 |
issn | 1865-0929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029242314 |
oclc_num | 960002417 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
physical | 1 Online-Ressource (XXII, 474 Seiten, 179 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Communications in Computer and Information Science |
series2 | Communications in computer and information science |
spelling | SSCC 4. 2016 Jaipur Verfasser (DE-588)1116301768 aut Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) Singapore Springer [2016] 1 Online-Ressource (XXII, 474 Seiten, 179 illus) txt rdacontent c rdamedia cr rdacarrier Communications in computer and information science 625 1865-0929 Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Systems and Data Security Data Structures Data Encryption Computer Communication Networks Informatik (DE-588)1071861417 Konferenzschrift 2016 Jaipur gnd-content Mueller, Peter Sonstige oth Thampi, Sabu M. Sonstige (DE-588)1034405217 oth Bhuiyan, Md Zakirul Alam Sonstige oth Ko, Ryan Sonstige oth Doss, Robin Sonstige (DE-588)107496697X oth Alcaraz Calero, Jose M. Sonstige oth Erscheint auch als Druckausgabe 978-981-10-2737-6 Communications in Computer and Information Science 625 (DE-604)BV041227480 625 https://doi.org/10.1007/978-981-10-2738-3 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings Communications in Computer and Information Science Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Systems and Data Security Data Structures Data Encryption Computer Communication Networks Informatik |
subject_GND | (DE-588)1071861417 |
title | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings |
title_auth | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings |
title_exact_search | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings |
title_full | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) |
title_fullStr | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) |
title_full_unstemmed | Security in computing and communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings Peter Mueller, Sabu M. Thampi, Md Zakirul Alam Bhuiyan, Ryan Ko, Robin Doss, Jose M. Alcaraz Calero (eds.) |
title_short | Security in computing and communications |
title_sort | security in computing and communications 4th international symposium sscc 2016 jaipur india september 21 24 2016 proceedings |
title_sub | 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016 : proceedings |
topic | Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Systems and Data Security Data Structures Data Encryption Computer Communication Networks Informatik |
topic_facet | Computer science Computer communication systems Computer security Data structures (Computer science) Data encryption (Computer science) Computer Science Systems and Data Security Data Structures Data Encryption Computer Communication Networks Informatik Konferenzschrift 2016 Jaipur |
url | https://doi.org/10.1007/978-981-10-2738-3 |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT ssccjaipur securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings AT muellerpeter securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings AT thampisabum securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings AT bhuiyanmdzakirulalam securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings AT koryan securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings AT dossrobin securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings AT alcarazcalerojosem securityincomputingandcommunications4thinternationalsymposiumsscc2016jaipurindiaseptember21242016proceedings |