Security and privacy in communication networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings Part 1
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2018]
|
Schriftenreihe: | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
254 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XVII, 607 Seiten, 204 illus., 136 illus. in color) |
ISBN: | 9783030017019 |
DOI: | 10.1007/978-3-030-01701-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 cc4500 | ||
---|---|---|---|
001 | BV045456277 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 190212s2018 |||| o||u| ||||||eng d | ||
020 | |a 9783030017019 |c Online |9 978-3-030-01701-9 | ||
024 | 7 | |a 10.1007/978-3-030-01701-9 |2 doi | |
035 | |a (OCoLC)1086273631 | ||
035 | |a (DE-599)BVBBV045456277 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 2018 |0 (DE-625)160839: |2 rvk | ||
111 | 2 | |a SecureComm |n 14. |d 2018 |c Singapur |j Verfasser |0 (DE-588)1177843919 |4 aut | |
245 | 1 | 0 | |a Security and privacy in communication networks |b 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings |n Part 1 |c Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.) |
264 | 1 | |a Cham |b Springer |c [2018] | |
300 | |a 1 Online-Ressource (XVII, 607 Seiten, 204 illus., 136 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 254 | |
490 | 0 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data structures (Computer scienc | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Beyah, Raheem |4 edt | |
700 | 1 | |a Chang, Bing |4 edt | |
700 | 1 | |a Li, Yingjiu |0 (DE-588)136886922 |4 edt | |
773 | 0 | 8 | |w (DE-604)BV045456268 |g 1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-01700-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-01702-6 |
830 | 0 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 254 |w (DE-604)BV041557366 |9 254 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-01701-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNS | ||
940 | 1 | |q ZDB-2-SCS_2018 | |
940 | 1 | |q ZDB-2-LNS_2018 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030841554 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l BTU01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FHA01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FHI01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FHM01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FHN01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FHR01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FKE01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FLA01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FRO01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FWS01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l FWS02 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l HTW01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UBG01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UBM01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UBT01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UBW01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UBY01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UER01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-01701-9 |l UPA01 |p ZDB-2-LNS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 715277 |
---|---|
_version_ | 1806187215427993600 |
any_adam_object | |
author2 | Beyah, Raheem Chang, Bing Li, Yingjiu |
author2_role | edt edt edt |
author2_variant | r b rb b c bc y l yl |
author_GND | (DE-588)136886922 |
author_corporate | SecureComm Singapur |
author_corporate_role | aut |
author_facet | Beyah, Raheem Chang, Bing Li, Yingjiu SecureComm Singapur |
author_sort | SecureComm Singapur |
building | Verbundindex |
bvnumber | BV045456277 |
classification_rvk | SS 2018 |
collection | ZDB-2-SCS ZDB-2-LNS |
ctrlnum | (OCoLC)1086273631 (DE-599)BVBBV045456277 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-030-01701-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04493nmm a2200805 cc4500</leader><controlfield tag="001">BV045456277</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190212s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030017019</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-01701-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-01701-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1086273631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045456277</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 2018</subfield><subfield code="0">(DE-625)160839:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">SecureComm</subfield><subfield code="n">14.</subfield><subfield code="d">2018</subfield><subfield code="c">Singapur</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1177843919</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy in communication networks</subfield><subfield code="b">14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings</subfield><subfield code="n">Part 1</subfield><subfield code="c">Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 607 Seiten, 204 illus., 136 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">254</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer scienc</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Beyah, Raheem</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chang, Bing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Yingjiu</subfield><subfield code="0">(DE-588)136886922</subfield><subfield code="4">edt</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV045456268</subfield><subfield code="g">1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-01700-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-01702-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">254</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">254</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNS_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030841554</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-01701-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV045456277 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T14:12:37Z |
institution | BVB |
institution_GND | (DE-588)1177843919 |
isbn | 9783030017019 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030841554 |
oclc_num | 1086273631 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XVII, 607 Seiten, 204 illus., 136 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-LNS ZDB-2-SCS_2018 ZDB-2-LNS_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spellingShingle | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Data Structures and Information Theory Computer security Computer network architectures Computer science Data structures (Computer scienc |
subject_GND | (DE-588)1071861417 |
title | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings |
title_auth | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings |
title_exact_search | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings |
title_full | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings Part 1 Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.) |
title_fullStr | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings Part 1 Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.) |
title_full_unstemmed | Security and privacy in communication networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings Part 1 Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.) |
title_short | Security and privacy in communication networks |
title_sort | security and privacy in communication networks 14th international conference securecomm 2018 singapore singapore august 8 10 2018 proceedings |
title_sub | 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018 : proceedings |
topic | Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Data Structures and Information Theory Computer security Computer network architectures Computer science Data structures (Computer scienc |
topic_facet | Systems and Data Security Computer Systems Organization and Communication Networks Computing Milieux Data Structures and Information Theory Computer security Computer network architectures Computer science Data structures (Computer scienc Konferenzschrift |
url | https://doi.org/10.1007/978-3-030-01701-9 |
volume_link | (DE-604)BV045456268 (DE-604)BV041557366 |
work_keys_str_mv | AT securecommsingapur securityandprivacyincommunicationnetworks14thinternationalconferencesecurecomm2018singaporesingaporeaugust8102018proceedingspart1 AT beyahraheem securityandprivacyincommunicationnetworks14thinternationalconferencesecurecomm2018singaporesingaporeaugust8102018proceedingspart1 AT changbing securityandprivacyincommunicationnetworks14thinternationalconferencesecurecomm2018singaporesingaporeaugust8102018proceedingspart1 AT liyingjiu securityandprivacyincommunicationnetworks14thinternationalconferencesecurecomm2018singaporesingaporeaugust8102018proceedingspart1 |