Information security applications: 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2018]
|
Schriftenreihe: | Lecture notes in computer science
10763 |
Schlagworte: | |
Beschreibung: | XI, 338 Seiten Illustrationen, Diagramme |
ISBN: | 9783319935621 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV045079578 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 180709s2018 xx a||| |||| 10||| eng d | ||
020 | |a 9783319935621 |9 978-3-319-93562-1 | ||
035 | |a (OCoLC)1047703159 | ||
035 | |a (DE-599)BVBBV045079578 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information security applications |b 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers |c Brent ByungHoon Kang, Taesoo Kim (eds.) |
264 | 1 | |a Cham |b Springer |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a XI, 338 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10763 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Informatik | |
650 | 4 | |a Künstliche Intelligenz | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2017 |z Jeju |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Kang, Brent ByungHoon |4 edt | |
711 | 2 | |a WISA |n 18. |d 2017 |c Jeju |0 (DE-588)1162461497 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-93563-8 |
830 | 0 | |a Lecture notes in computer science |v 10763 |w (DE-604)BV000000607 |9 10763 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030470574 |
Datensatz im Suchindex
_version_ | 1820875716001005568 |
---|---|
adam_text | |
any_adam_object | |
author2 | Kang, Brent ByungHoon |
author2_role | edt |
author2_variant | b b k bb bbk |
author_facet | Kang, Brent ByungHoon |
building | Verbundindex |
bvnumber | BV045079578 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 465f |
ctrlnum | (OCoLC)1047703159 (DE-599)BVBBV045079578 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV045079578</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180709s2018 xx a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319935621</subfield><subfield code="9">978-3-319-93562-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1047703159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045079578</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security applications</subfield><subfield code="b">18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers</subfield><subfield code="c">Brent ByungHoon Kang, Taesoo Kim (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 338 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10763</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2017</subfield><subfield code="z">Jeju</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kang, Brent ByungHoon</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">WISA</subfield><subfield code="n">18.</subfield><subfield code="d">2017</subfield><subfield code="c">Jeju</subfield><subfield code="0">(DE-588)1162461497</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-93563-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10763</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10763</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030470574</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2017 Jeju gnd-content |
genre_facet | Konferenzschrift 2017 Jeju |
id | DE-604.BV045079578 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:20:03Z |
institution | BVB |
institution_GND | (DE-588)1162461497 |
isbn | 9783319935621 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030470574 |
oclc_num | 1047703159 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XI, 338 Seiten Illustrationen, Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (eds.) Cham Springer [2018] © 2018 XI, 338 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10763 Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2017 Jeju gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s DE-604 Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Computerforensik (DE-588)4774034-6 s Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kang, Brent ByungHoon edt WISA 18. 2017 Jeju (DE-588)1162461497 oth Erscheint auch als Online-Ausgabe 978-3-319-93563-8 Lecture notes in computer science 10763 (DE-604)BV000000607 10763 |
spellingShingle | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Lecture notes in computer science Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4330656-1 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4774034-6 (DE-588)4709127-7 (DE-588)1071861417 |
title | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers |
title_auth | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers |
title_exact_search | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers |
title_full | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (eds.) |
title_fullStr | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (eds.) |
title_full_unstemmed | Information security applications 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers Brent ByungHoon Kang, Taesoo Kim (eds.) |
title_short | Information security applications |
title_sort | information security applications 18th international conference wisa 2017 jeju island korea august 24 26 2017 revised selected papers |
title_sub | 18th international conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017 : revised selected papers |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Artificial intelligence Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Artificial Intelligence (incl. Robotics) Informatik Künstliche Intelligenz Datensicherung Rechnernetz Authentifikation Kryptosystem Kryptoanalyse Computersicherheit Computerforensik Sicherheitsprotokoll Konferenzschrift 2017 Jeju |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kangbrentbyunghoon informationsecurityapplications18thinternationalconferencewisa2017jejuislandkoreaaugust24262017revisedselectedpapers AT wisajeju informationsecurityapplications18thinternationalconferencewisa2017jejuislandkoreaaugust24262017revisedselectedpapers |