|
|
|
|
| LEADER |
02992nam a2200529 4500 |
| 001 |
978-981-13-3095-7 |
| 003 |
DE-He213 |
| 005 |
20191027061201.0 |
| 007 |
cr nn 008mamaa |
| 008 |
181103s2018 si | s |||| 0|eng d |
| 020 |
|
|
|a 9789811330957
|9 978-981-13-3095-7
|
| 024 |
7 |
|
|a 10.1007/978-981-13-3095-7
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 072 |
|
7 |
|a UR
|2 bicssc
|
| 072 |
|
7 |
|a COM053000
|2 bisacsh
|
| 072 |
|
7 |
|a UR
|2 thema
|
| 072 |
|
7 |
|a UTN
|2 thema
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 245 |
1 |
0 |
|a Frontiers in Cyber Security
|h [electronic resource] :
|b First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings /
|c edited by Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang.
|
| 250 |
|
|
|a 1st ed. 2018.
|
| 264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2018.
|
| 300 |
|
|
|a XVII, 300 p. 199 illus., 64 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 879
|
| 520 |
|
|
|a This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design. .
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Computer communication systems.
|
| 650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
| 650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
| 650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
| 700 |
1 |
|
|a Li, Fagen.
|e editor.
|0 (orcid)0000-0001-6289-1265
|1 https://orcid.org/0000-0001-6289-1265
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Takagi, Tsuyoshi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Xu, Chunxiang.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Zhang, Xiaosong.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9789811330940
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9789811330964
|
| 830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 879
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-13-3095-7
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|