Transactions on large-scale data- and knowledge-centered systems XXXI: special issue on data and security engineering
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer
[2017]
|
Schriftenreihe: | Lecture Notes in Computer Science
10140 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource IX, 147 Seiten Illustrationen, Diagramme |
ISBN: | 9783662541739 9783662541722 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-54173-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043990447 | ||
003 | DE-604 | ||
005 | 20211215 | ||
007 | cr|uuu---uuuuu | ||
008 | 170110s2017 |||| o||u| ||||||eng d | ||
020 | |a 9783662541739 |c Online |9 978-3-662-54173-9 | ||
020 | |a 9783662541722 |c Print |9 978-3-662-54172-2 | ||
024 | 7 | |a 10.1007/978-3-662-54173-9 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-662-54173-9 | ||
035 | |a (ZDB-2-LNC)978-3-662-54173-9 | ||
035 | |a (OCoLC)968329797 | ||
035 | |a (DE-599)BVBBV043990447 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-860 |a DE-20 |a DE-384 |a DE-188 |a DE-19 | ||
082 | 0 | |a 006.312 |2 23 | |
084 | |a DAT 703f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Transactions on large-scale data- and knowledge-centered systems XXXI |b special issue on data and security engineering |c Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (Eds.) |
264 | 1 | |a Berlin, Heidelberg |b Springer |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 Online-Ressource IX, 147 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v Volume 10140 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Data mining | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Hameurlain, Abdelkader |d 1952- |0 (DE-588)11553959X |4 edt | |
830 | 0 | |a Lecture Notes in Computer Science |v 10140 |w (DE-604)BV014880109 |9 10140 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-54173-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2017 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029398654 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FWS01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l FWS02 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l HTW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2017 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-54173-9 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 634846 |
---|---|
_version_ | 1806180624002711552 |
any_adam_object | |
author2 | Hameurlain, Abdelkader 1952- |
author2_role | edt |
author2_variant | a h ah |
author_GND | (DE-588)11553959X |
author_facet | Hameurlain, Abdelkader 1952- |
building | Verbundindex |
bvnumber | BV043990447 |
classification_tum | DAT 703f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)978-3-662-54173-9 (ZDB-2-LNC)978-3-662-54173-9 (OCoLC)968329797 (DE-599)BVBBV043990447 |
dewey-full | 006.312 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.312 |
dewey-search | 006.312 |
dewey-sort | 16.312 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-54173-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04503nmm a2200853zcb4500</leader><controlfield tag="001">BV043990447</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211215 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170110s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662541739</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-54173-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662541722</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-54172-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-54173-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-54173-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)978-3-662-54173-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)968329797</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043990447</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 703f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Transactions on large-scale data- and knowledge-centered systems XXXI</subfield><subfield code="b">special issue on data and security engineering</subfield><subfield code="c">Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource IX, 147 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 10140</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hameurlain, Abdelkader</subfield><subfield code="d">1952-</subfield><subfield code="0">(DE-588)11553959X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10140</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10140</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2017</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029398654</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2017</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-54173-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV043990447 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T12:27:51Z |
institution | BVB |
isbn | 9783662541739 9783662541722 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029398654 |
oclc_num | 968329797 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-860 DE-20 DE-384 DE-188 DE-19 DE-BY-UBM |
owner_facet | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-860 DE-20 DE-384 DE-188 DE-19 DE-BY-UBM |
physical | 1 Online-Ressource IX, 147 Seiten Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2017 ZDB-2-LNC ZDB-2-LNC_2017 |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering Lecture Notes in Computer Science Computer science Computer security Data encryption (Computer science) Algorithms Data mining Management information systems Computer Science Data Mining and Knowledge Discovery Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Data Encryption Information Systems Applications (incl. Internet) Systems and Data Security Informatik |
subject_GND | (DE-588)4143413-4 |
title | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering |
title_auth | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering |
title_exact_search | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering |
title_full | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (Eds.) |
title_fullStr | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (Eds.) |
title_full_unstemmed | Transactions on large-scale data- and knowledge-centered systems XXXI special issue on data and security engineering Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (Eds.) |
title_short | Transactions on large-scale data- and knowledge-centered systems XXXI |
title_sort | transactions on large scale data and knowledge centered systems xxxi special issue on data and security engineering |
title_sub | special issue on data and security engineering |
topic | Computer science Computer security Data encryption (Computer science) Algorithms Data mining Management information systems Computer Science Data Mining and Knowledge Discovery Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Data Encryption Information Systems Applications (incl. Internet) Systems and Data Security Informatik |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms Data mining Management information systems Computer Science Data Mining and Knowledge Discovery Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Data Encryption Information Systems Applications (incl. Internet) Systems and Data Security Informatik Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-662-54173-9 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT hameurlainabdelkader transactionsonlargescaledataandknowledgecenteredsystemsxxxispecialissueondataandsecurityengineering |