000 | 03118nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-29814-6 | ||
003 | DE-He213 | ||
005 | 20240730192211.0 | ||
007 | cr nn 008mamaa | ||
008 | 160330s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319298146 _9978-3-319-29814-6 |
||
024 | 7 |
_a10.1007/978-3-319-29814-6 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aInformation and Communications Security _h[electronic resource] : _b17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers / _cedited by Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXVIII, 486 p. 133 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9543 |
|
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015. The 24 revised full papers and 19 short papers presented were carefully selected from 148 submissions. The papers provide the latest results in research and development in the field of information security and applied cryptology. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9148981 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer Communication Networks. _9148982 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aQing, Sihan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9148983 |
|
700 | 1 |
_aOkamoto, Eiji. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9148984 |
|
700 | 1 |
_aKim, Kwangjo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9148985 |
|
700 | 1 |
_aLiu, Dongmei. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9148986 |
|
710 | 2 |
_aSpringerLink (Online service) _9148987 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319298139 |
776 | 0 | 8 |
_iPrinted edition: _z9783319298153 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9543 _9148988 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-29814-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94123 _d94123 |