Information systems security: 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2016]
|
Schriftenreihe: | Lecture notes in computer science
10063 |
Schlagworte: | |
Beschreibung: | XV, 544 Seiten Illustrationen, Diagramme |
ISBN: | 9783319498058 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044010085 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 170124s2016 a||| |||| 10||| eng d | ||
020 | |a 9783319498058 |9 978-3-319-49805-8 | ||
035 | |a (OCoLC)965620712 | ||
035 | |a (DE-599)BVBBV044010085 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 259f |2 stub | ||
111 | 2 | |a ICISS |n 12. |d 2016 |c Jaipur |j Verfasser |0 (DE-588)1122128274 |4 aut | |
245 | 1 | 0 | |a Information systems security |b 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings |c Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) |
264 | 1 | |a Cham |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a XV, 544 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10063 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 3 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 4 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Ray, Indrajit |0 (DE-588)123834201 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-49806-5 |
830 | 0 | |a Lecture notes in computer science |v 10063 |w (DE-604)BV000000607 |9 10063 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029417811 |
Datensatz im Suchindex
_version_ | 1804176998916947968 |
---|---|
any_adam_object | |
author2 | Ray, Indrajit |
author2_role | edt |
author2_variant | i r ir |
author_GND | (DE-588)123834201 |
author_corporate | ICISS Jaipur |
author_corporate_role | aut |
author_facet | Ray, Indrajit ICISS Jaipur |
author_sort | ICISS Jaipur |
building | Verbundindex |
bvnumber | BV044010085 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 050f DAT 461f DAT 259f |
ctrlnum | (OCoLC)965620712 (DE-599)BVBBV044010085 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03729nam a2200949zcb4500</leader><controlfield tag="001">BV044010085</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170124s2016 a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319498058</subfield><subfield code="9">978-3-319-49805-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)965620712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044010085</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 259f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ICISS</subfield><subfield code="n">12.</subfield><subfield code="d">2016</subfield><subfield code="c">Jaipur</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1122128274</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings</subfield><subfield code="c">Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 544 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10063</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ray, Indrajit</subfield><subfield code="0">(DE-588)123834201</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-49806-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10063</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10063</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029417811</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044010085 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:41:06Z |
institution | BVB |
institution_GND | (DE-588)1122128274 |
isbn | 9783319498058 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029417811 |
oclc_num | 965620712 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XV, 544 Seiten Illustrationen, Diagramme |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ICISS 12. 2016 Jaipur Verfasser (DE-588)1122128274 aut Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) Cham Springer [2016] © 2016 XV, 544 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10063 Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Rechnernetz (DE-588)4070085-9 s Informationssystem (DE-588)4072806-7 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Kryptologie (DE-588)4033329-2 s Verteiltes System (DE-588)4238872-7 s Anwendungssystem (DE-588)4139375-2 s Kryptosystem (DE-588)4209132-9 s Ray, Indrajit (DE-588)123834201 edt Erscheint auch als Online-Ausgabe 978-3-319-49806-5 Lecture notes in computer science 10063 (DE-604)BV000000607 10063 |
spellingShingle | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings Lecture notes in computer science Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Anwendungssystem (DE-588)4139375-2 gnd Informationssystem (DE-588)4072806-7 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Privatsphäre (DE-588)4123980-5 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Verteiltes System (DE-588)4238872-7 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4139375-2 (DE-588)4072806-7 (DE-588)4033329-2 (DE-588)4274324-2 (DE-588)4123980-5 (DE-588)4070085-9 (DE-588)4293034-0 (DE-588)4238872-7 (DE-588)4209132-9 (DE-588)1071861417 |
title | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings |
title_auth | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings |
title_exact_search | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings |
title_full | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) |
title_fullStr | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) |
title_full_unstemmed | Information systems security 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti (eds.) |
title_short | Information systems security |
title_sort | information systems security 12th international conference iciss 2016 jaipur india december 16 20 2016 proceedings |
title_sub | 12th international conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Anwendungssystem (DE-588)4139375-2 gnd Informationssystem (DE-588)4072806-7 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd Privatsphäre (DE-588)4123980-5 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Verteiltes System (DE-588)4238872-7 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Algorithms Management information systems Computer Science Systems and Data Security Security Data Encryption Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Informatik Datensicherung Authentifikation Anwendungssystem Informationssystem Kryptologie Computersicherheit Privatsphäre Rechnernetz Zugriffskontrolle Verteiltes System Kryptosystem Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT icissjaipur informationsystemssecurity12thinternationalconferenceiciss2016jaipurindiadecember16202016proceedings AT rayindrajit informationsystemssecurity12thinternationalconferenceiciss2016jaipurindiadecember16202016proceedings |