|
|
|
|
LEADER |
02691nam a22005655i 4500 |
001 |
978-3-662-48683-2 |
003 |
DE-He213 |
005 |
20151111152301.0 |
007 |
cr nn 008mamaa |
008 |
151107s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662486832
|9 978-3-662-48683-2
|
024 |
7 |
|
|a 10.1007/978-3-662-48683-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applications and Techniques in Information Security
|h [electronic resource] :
|b 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings /
|c edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XVII, 398 p. 147 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 557
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
700 |
1 |
|
|a Niu, Wenjia.
|e editor.
|
700 |
1 |
|
|a Li, Gang.
|e editor.
|
700 |
1 |
|
|a Liu, Jiqiang.
|e editor.
|
700 |
1 |
|
|a Tan, Jianlong.
|e editor.
|
700 |
1 |
|
|a Guo, Li.
|e editor.
|
700 |
1 |
|
|a Han, Zhen.
|e editor.
|
700 |
1 |
|
|a Batten, Lynn.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662486825
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 557
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-662-48683-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|