Cryptology and network security: 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2018]
|
Schriftenreihe: | Lecture notes in computer science
11124 |
Schlagworte: | |
Beschreibung: | XIII, 518 Seiten Illustrationen, Diagramme |
ISBN: | 9783030004330 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV045214837 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 181001s2018 a||| |||| 10||| eng d | ||
020 | |a 9783030004330 |9 978-3-030-00433-0 | ||
035 | |a (OCoLC)1055680459 | ||
035 | |a (DE-599)BVBBV045214837 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
111 | 2 | |a CANS |n 17. |d 2018 |c Neapel |j Verfasser |0 (DE-588)1168167108 |4 aut | |
245 | 1 | 0 | |a Cryptology and network security |b 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings |c Jan Camenisch, Panos Papadimitratos (eds.) |
264 | 1 | |a Cham |b Springer |c [2018] | |
300 | |a XIII, 518 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 11124 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2018 |z Neapel |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Camenisch, Jan |d 1968- |0 (DE-588)1089554885 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-00434-7 |
830 | 0 | |a Lecture notes in computer science |v 11124 |w (DE-604)BV000000607 |9 11124 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030603557 |
Datensatz im Suchindex
_version_ | 1804178928943759360 |
---|---|
any_adam_object | |
author2 | Camenisch, Jan 1968- |
author2_role | edt |
author2_variant | j c jc |
author_GND | (DE-588)1089554885 |
author_corporate | CANS Neapel |
author_corporate_role | aut |
author_facet | Camenisch, Jan 1968- CANS Neapel |
author_sort | CANS Neapel |
building | Verbundindex |
bvnumber | BV045214837 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 461f |
ctrlnum | (OCoLC)1055680459 (DE-599)BVBBV045214837 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02639nam a2200673zcb4500</leader><controlfield tag="001">BV045214837</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">181001s2018 a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030004330</subfield><subfield code="9">978-3-030-00433-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1055680459</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045214837</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">17.</subfield><subfield code="d">2018</subfield><subfield code="c">Neapel</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1168167108</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings</subfield><subfield code="c">Jan Camenisch, Panos Papadimitratos (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 518 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11124</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2018</subfield><subfield code="z">Neapel</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Camenisch, Jan</subfield><subfield code="d">1968-</subfield><subfield code="0">(DE-588)1089554885</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-00434-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11124</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">11124</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030603557</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2018 Neapel gnd-content |
genre_facet | Konferenzschrift 2018 Neapel |
id | DE-604.BV045214837 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:11:46Z |
institution | BVB |
institution_GND | (DE-588)1168167108 |
isbn | 9783030004330 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030603557 |
oclc_num | 1055680459 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XIII, 518 Seiten Illustrationen, Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | CANS 17. 2018 Neapel Verfasser (DE-588)1168167108 aut Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings Jan Camenisch, Panos Papadimitratos (eds.) Cham Springer [2018] XIII, 518 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 11124 Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2018 Neapel gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Camenisch, Jan 1968- (DE-588)1089554885 edt Erscheint auch als Online-Ausgabe 978-3-030-00434-7 Lecture notes in computer science 11124 (DE-604)BV000000607 11124 |
spellingShingle | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings Lecture notes in computer science Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
subject_GND | (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)1071861417 |
title | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings |
title_auth | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings |
title_exact_search | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings |
title_full | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings Jan Camenisch, Panos Papadimitratos (eds.) |
title_fullStr | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings Jan Camenisch, Panos Papadimitratos (eds.) |
title_full_unstemmed | Cryptology and network security 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings Jan Camenisch, Panos Papadimitratos (eds.) |
title_short | Cryptology and network security |
title_sort | cryptology and network security 17th international conference cans 2018 naples italy september 30 october 3 2018 proceedings |
title_sub | 17th international conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Coding theory Management information systems Computer Science Data Encryption Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems Informatik Sicherheitsprotokoll Datensicherung Rechnernetz Computersicherheit Kryptosystem Kryptoanalyse Konferenzschrift 2018 Neapel |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT cansneapel cryptologyandnetworksecurity17thinternationalconferencecans2018naplesitalyseptember30october32018proceedings AT camenischjan cryptologyandnetworksecurity17thinternationalconferencecans2018naplesitalyseptember30october32018proceedings |