|
|
|
|
LEADER |
03542nam a2200577 4500 |
001 |
978-3-030-01704-0 |
003 |
DE-He213 |
005 |
20191022022505.0 |
007 |
cr nn 008mamaa |
008 |
181228s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030017040
|9 978-3-030-01704-0
|
024 |
7 |
|
|a 10.1007/978-3-030-01704-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security and Privacy in Communication Networks
|h [electronic resource] :
|b 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II /
|c edited by Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XVIII, 525 p. 150 illus., 89 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 255
|
505 |
0 |
|
|a IoT security -- user and data privacy -- mobile security -- wireless security -- software security -- cloud security -- social network and enterprise security -- network security -- applied cryptography -- web security.
|
520 |
|
|
|a This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15009
|
700 |
1 |
|
|a Beyah, Raheem.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Chang, Bing.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Li, Yingjiu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Zhu, Sencun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030017033
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030017057
|
830 |
|
0 |
|a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
|x 1867-8211 ;
|v 255
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-01704-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNS
|
950 |
|
|
|a Computer Science (Springer-11645)
|