Cyber security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers
Gespeichert in:
Weitere Verfasser: | , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore, Singapore
Springer
[2020]
|
Schriftenreihe: | Communications in computer and information science
1299 |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9789813349223 |
DOI: | 10.1007/978-981-33-4922-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047135316 | ||
003 | DE-604 | ||
005 | 20230120 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 210211s2020 |||| o||u| ||||||eng d | ||
020 | |a 9789813349223 |c Online |9 978-981-33-4922-3 | ||
024 | 7 | |a 10.1007/978-981-33-4922-3 |2 doi | |
035 | |a (ZDB-2-SCS)9789813349223 | ||
035 | |a (ZDB-2-SOB)9789813349223 | ||
035 | |a (OCoLC)1237586312 | ||
035 | |a (DE-599)BVBBV047135316 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-525 |a DE-12 |a DE-634 |a DE-210 |a DE-521 |a DE-1102 |a DE-1046 |a DE-1028 |a DE-Aug4 |a DE-1050 |a DE-573 |a DE-M347 |a DE-92 |a DE-1051 |a DE-898 |a DE-859 |a DE-860 |a DE-1049 |a DE-861 |a DE-188 |a DE-863 |a DE-862 |a DE-523 |a DE-Re13 |a DE-M483 |a DE-Y3 |a DE-255 |a DE-Y7 |a DE-Y2 |a DE-70 |a DE-2174 |a DE-127 |a DE-22 |a DE-155 |a DE-150 |a DE-91 |a DE-384 |a DE-473 |a DE-19 |a DE-355 |a DE-703 |a DE-20 |a DE-706 |a DE-824 |a DE-29 |a DE-739 |a DE-235 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Cyber security |b 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers |c Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou (eds.) |
264 | 1 | |a Singapore, Singapore |b Springer |c [2020] | |
264 | 4 | |c © 2020 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 1299 | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Computer System Implementation | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Application software | |
650 | 4 | |a Architecture, Computer | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 12.08.2020 |z Beijing |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Mensch-Maschine-Kommunikation |0 (DE-588)4125909-9 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lu, Wei |4 edt | |
700 | 1 | |a Wen, Qiaoyan |4 edt | |
700 | 1 | |a Zhang, Yuqing |4 edt | |
700 | 1 | |a Lang, Bo |4 edt | |
700 | 1 | |a Wen, Weiping |4 edt | |
700 | 1 | |a Yan, Hanbing |4 edt | |
700 | 1 | |a Li, Chao |4 edt | |
700 | 1 | |a Ding, Li |4 edt | |
700 | 1 | |a Li, Ruiguang |4 edt | |
700 | 1 | |a Zhou, Yu |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-33-4921-6 |
830 | 0 | |a Communications in computer and information science |v 1299 |w (DE-604)BV041227480 |9 1299 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-33-4922-3 |x Verlag |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://directory.doabooks.org/handle/20.500.12854/63624 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-94-OAB |a ZDB-2-SCS |a ZDB-2-SOB | ||
940 | 1 | |q ZDB-2-SCS_2020 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032541347 |
Datensatz im Suchindex
DE-BY-FWS_katkey | 871585 |
---|---|
_version_ | 1813305980356657152 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Lu, Wei Wen, Qiaoyan Zhang, Yuqing Lang, Bo Wen, Weiping Yan, Hanbing Li, Chao Ding, Li Li, Ruiguang Zhou, Yu |
author2_role | edt edt edt edt edt edt edt edt edt edt |
author2_variant | w l wl q w qw y z yz b l bl w w ww h y hy c l cl l d ld r l rl y z yz |
author_facet | Lu, Wei Wen, Qiaoyan Zhang, Yuqing Lang, Bo Wen, Weiping Yan, Hanbing Li, Chao Ding, Li Li, Ruiguang Zhou, Yu |
building | Verbundindex |
bvnumber | BV047135316 |
classification_tum | DAT 000 |
collection | ZDB-94-OAB ZDB-2-SCS ZDB-2-SOB |
ctrlnum | (ZDB-2-SCS)9789813349223 (ZDB-2-SOB)9789813349223 (OCoLC)1237586312 (DE-599)BVBBV047135316 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-981-33-4922-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zcb4500</leader><controlfield tag="001">BV047135316</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230120</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210211s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789813349223</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-33-4922-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-33-4922-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789813349223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SOB)9789813349223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1237586312</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047135316</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-525</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-210</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-Re13</subfield><subfield code="a">DE-M483</subfield><subfield code="a">DE-Y3</subfield><subfield code="a">DE-255</subfield><subfield code="a">DE-Y7</subfield><subfield code="a">DE-Y2</subfield><subfield code="a">DE-70</subfield><subfield code="a">DE-2174</subfield><subfield code="a">DE-127</subfield><subfield code="a">DE-22</subfield><subfield code="a">DE-155</subfield><subfield code="a">DE-150</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-235</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security</subfield><subfield code="b">17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers</subfield><subfield code="c">Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore, Singapore</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">1299</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer System Implementation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture, Computer</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">12.08.2020</subfield><subfield code="z">Beijing</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Mensch-Maschine-Kommunikation</subfield><subfield code="0">(DE-588)4125909-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lu, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Qiaoyan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Yuqing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lang, Bo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wen, Weiping</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Hanbing</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Chao</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ding, Li</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Ruiguang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Yu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-33-4921-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">1299</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">1299</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-33-4922-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://directory.doabooks.org/handle/20.500.12854/63624</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-94-OAB</subfield><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-SOB</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032541347</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 12.08.2020 Beijing gnd-content |
genre_facet | Konferenzschrift 12.08.2020 Beijing |
id | DE-604.BV047135316 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:33:43Z |
indexdate | 2024-10-19T04:02:21Z |
institution | BVB |
isbn | 9789813349223 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032541347 |
oclc_num | 1237586312 |
open_access_boolean | 1 |
owner | DE-525 DE-12 DE-634 DE-210 DE-521 DE-1102 DE-1046 DE-1028 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-1049 DE-861 DE-188 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-523 DE-Re13 DE-BY-UBR DE-M483 DE-Y3 DE-255 DE-Y7 DE-Y2 DE-70 DE-2174 DE-127 DE-22 DE-BY-UBG DE-155 DE-BY-UBR DE-150 DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 DE-235 |
owner_facet | DE-525 DE-12 DE-634 DE-210 DE-521 DE-1102 DE-1046 DE-1028 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-1049 DE-861 DE-188 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-523 DE-Re13 DE-BY-UBR DE-M483 DE-Y3 DE-255 DE-Y7 DE-Y2 DE-70 DE-2174 DE-127 DE-22 DE-BY-UBG DE-155 DE-BY-UBR DE-150 DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 DE-235 |
physical | 1 Online-Ressource |
psigel | ZDB-94-OAB ZDB-2-SCS ZDB-2-SOB ZDB-2-SCS_2020 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series | Communications in computer and information science |
series2 | Communications in computer and information science |
spellingShingle | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers Communications in computer and information science Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Computer security Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4125909-9 (DE-588)1071861417 |
title | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers |
title_auth | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers |
title_exact_search | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers |
title_exact_search_txtP | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers |
title_full | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou (eds.) |
title_fullStr | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou (eds.) |
title_full_unstemmed | Cyber security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers Wei Lu, Qiaoyan Wen, Yuqing Zhang, Bo Lang, Weiping Wen, Hanbing Yan, Chao Li, Li Ding, Ruiguang Li, Yu Zhou (eds.) |
title_short | Cyber security |
title_sort | cyber security 17th china annual conference cncert 2020 beijing china august 12 2020 revised selected papers |
title_sub | 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020 : revised selected papers |
topic | Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Computer security Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Mensch-Maschine-Kommunikation (DE-588)4125909-9 gnd |
topic_facet | Systems and Data Security Computer Communication Networks Information Systems Applications (incl. Internet) Computer System Implementation Cryptology Mobile and Network Security Computer security Computer communication systems Application software Architecture, Computer Data encryption (Computer science) Computer networks / Security measures Datensicherung Kryptologie Mensch-Maschine-Kommunikation Konferenzschrift 12.08.2020 Beijing |
url | https://doi.org/10.1007/978-981-33-4922-3 https://directory.doabooks.org/handle/20.500.12854/63624 |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT luwei cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT wenqiaoyan cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT zhangyuqing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT langbo cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT wenweiping cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT yanhanbing cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT lichao cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT dingli cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT liruiguang cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers AT zhouyu cybersecurity17thchinaannualconferencecncert2020beijingchinaaugust122020revisedselectedpapers |