Cryptology and network security: 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2016]
|
Schriftenreihe: | Lecture notes in computer science
10052 |
Schlagworte: | |
Beschreibung: | XVI, 762 Seiten Illustrationen, Diagramme |
ISBN: | 9783319489643 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043879028 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 161116s2016 a||| |||| 10||| eng d | ||
020 | |a 9783319489643 |9 978-3-319-48964-3 | ||
035 | |a (OCoLC)964660222 | ||
035 | |a (DE-599)BVBBV043879028 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a CANS |n 15. |d 2016 |c Mailand |j Verfasser |0 (DE-588)1118651340 |4 aut | |
245 | 1 | 0 | |a Cryptology and network security |b 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings |c Sara Foresti, Giuseppe Persiano (eds.) |
264 | 1 | |a Cham |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a XVI, 762 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10052 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Foresti, Sara |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-48965-0 |
830 | 0 | |a Lecture notes in computer science |v 10052 |w (DE-604)BV000000607 |9 10052 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029288688 |
Datensatz im Suchindex
_version_ | 1804176772993908736 |
---|---|
any_adam_object | |
author2 | Foresti, Sara |
author2_role | edt |
author2_variant | s f sf |
author_corporate | CANS Mailand |
author_corporate_role | aut |
author_facet | Foresti, Sara CANS Mailand |
author_sort | CANS Mailand |
building | Verbundindex |
bvnumber | BV043879028 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)964660222 (DE-599)BVBBV043879028 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02606nam a2200685zcb4500</leader><controlfield tag="001">BV043879028</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">161116s2016 a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319489643</subfield><subfield code="9">978-3-319-48964-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)964660222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043879028</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">15.</subfield><subfield code="d">2016</subfield><subfield code="c">Mailand</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1118651340</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings</subfield><subfield code="c">Sara Foresti, Giuseppe Persiano (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 762 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10052</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foresti, Sara</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-48965-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10052</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10052</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029288688</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043879028 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:37:30Z |
institution | BVB |
institution_GND | (DE-588)1118651340 |
isbn | 9783319489643 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029288688 |
oclc_num | 964660222 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XVI, 762 Seiten Illustrationen, Diagramme |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | CANS 15. 2016 Mailand Verfasser (DE-588)1118651340 aut Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings Sara Foresti, Giuseppe Persiano (eds.) Cham Springer [2016] © 2016 XVI, 762 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10052 Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Foresti, Sara edt Erscheint auch als Online-Ausgabe 978-3-319-48965-0 Lecture notes in computer science 10052 (DE-604)BV000000607 10052 |
spellingShingle | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings Lecture notes in computer science Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4709127-7 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)1071861417 |
title | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings |
title_auth | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings |
title_exact_search | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings |
title_full | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings Sara Foresti, Giuseppe Persiano (eds.) |
title_fullStr | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings Sara Foresti, Giuseppe Persiano (eds.) |
title_full_unstemmed | Cryptology and network security 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings Sara Foresti, Giuseppe Persiano (eds.) |
title_short | Cryptology and network security |
title_sort | cryptology and network security 15th international conference cans 2016 milan italy november 14 16 2016 proceedings |
title_sub | 15th international conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Datensicherung Computersicherheit Rechnernetz Sicherheitsprotokoll Kryptosystem Kryptoanalyse Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT cansmailand cryptologyandnetworksecurity15thinternationalconferencecans2016milanitalynovember14162016proceedings AT forestisara cryptologyandnetworksecurity15thinternationalconferencecans2016milanitalynovember14162016proceedings |