|
|
|
|
LEADER |
03624nam a2200589 4500 |
001 |
978-981-15-0818-9 |
003 |
DE-He213 |
005 |
20191022181954.0 |
007 |
cr nn 008mamaa |
008 |
191017s2019 si | s |||| 0|eng d |
020 |
|
|
|a 9789811508189
|9 978-981-15-0818-9
|
024 |
7 |
|
|a 10.1007/978-981-15-0818-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Frontiers in Cyber Security
|h [electronic resource] :
|b Second International Conference, FCS 2019, Xi'an, China, November 15-17, 2019, Proceedings /
|c edited by Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Singapore :
|b Springer Singapore :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XVII, 365 p. 116 illus., 45 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 1105
|
505 |
0 |
|
|a Symmetric Key Cryptography -- Public Key Cryptography -- Post-quantum Cryptography -- Signature -- Attack and Behavior Detection -- Authenticated Key Agreement -- Blockchain -- System and Network Security.
|
520 |
|
|
|a This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi'an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28000
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
700 |
1 |
|
|a Shen, Bazhong.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Baocang.
|e editor.
|0 (orcid)0000-0002-2554-4464
|1 https://orcid.org/0000-0002-2554-4464
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Han, Jinguang.
|e editor.
|0 (orcid)0000-0002-4993-9452
|1 https://orcid.org/0000-0002-4993-9452
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yu, Yong.
|e editor.
|0 (orcid)0000-0003-0667-077X
|1 https://orcid.org/0000-0003-0667-077X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811508172
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811508196
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0929 ;
|v 1105
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-981-15-0818-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|