Applications and techniques in information security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209903 | ||
003 | DE-604 | ||
005 | 20160708 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 xx o|||| 10||| eng d | ||
020 | |a 9783662486832 |c Online |9 978-3-662-48683-2 | ||
024 | 7 | |a 10.1007/978-3-662-48683-2 |2 doi | |
035 | |a (OCoLC)932033314 | ||
035 | |a (DE-599)BVBBV043209903 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
111 | 2 | |a ATIS |n 6. |d 2015 |c Peking |j Verfasser |0 (DE-588)1081021292 |4 aut | |
245 | 1 | 0 | |a Applications and techniques in information security |b 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |c Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
264 | 1 | |a Berlin |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource (XVII, 398 Seiten, 147 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 557 |x 1865-0929 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Peking |2 gnd-content | |
700 | 1 | |a Niu, Wenjia |4 edt | |
700 | 1 | |a Li, Gang |4 edt | |
700 | 1 | |a Liu, Jiqiang |4 edt | |
700 | 1 | |a Tan, Jianlong |4 edt | |
700 | 1 | |a Guo, Li |0 (DE-588)171705777 |4 edt | |
700 | 1 | |a Han, Zhen |4 edt | |
700 | 1 | |a Batten, Lynn Margaret |d 1948- |0 (DE-588)123824710 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-662-48682-5 |
830 | 0 | |a Communications in Computer and Information Science |v 557 |w (DE-604)BV041227480 |9 557 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-48683-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028633063 | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-48683-2 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819371194577584128 |
---|---|
adam_text | APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE INTERNATIONAL
CONFERENCE ON APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS
2015, HELD IN BEIJING, CHINA, IN NOVEMBER 2015. THE 25 REVISED FULL
PAPERS AND 10 SHORT PAPERS PRESENTED WERE CAREFULLY REVIEWED AND
SELECTED FROM 103 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL
SECTIONS ONINVITED SPEECHES;CRYPTOGRAPH;EVALUATION, STANDARDS AND
PROTOCOLS;TRUST COMPUTING AND PRIVACY PROTECTION;CLOUD SECURITY AND
APPLICATIONS;TOOLS AND METHODOLOGIES;SYSTEM DESIGN AND
IMPLEMENTATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Niu, Wenjia Li, Gang Liu, Jiqiang Tan, Jianlong Guo, Li Han, Zhen Batten, Lynn Margaret 1948- |
author2_role | edt edt edt edt edt edt edt |
author2_variant | w n wn g l gl j l jl j t jt l g lg z h zh l m b lm lmb |
author_GND | (DE-588)171705777 (DE-588)123824710 |
author_corporate | ATIS Peking |
author_corporate_role | aut |
author_facet | Niu, Wenjia Li, Gang Liu, Jiqiang Tan, Jianlong Guo, Li Han, Zhen Batten, Lynn Margaret 1948- ATIS Peking |
author_sort | ATIS Peking |
building | Verbundindex |
bvnumber | BV043209903 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)932033314 (DE-599)BVBBV043209903 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-48683-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03919nam a2200757zcb4500</leader><controlfield tag="001">BV043209903</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160708 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662486832</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-48683-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-48683-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932033314</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209903</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ATIS</subfield><subfield code="n">6.</subfield><subfield code="d">2015</subfield><subfield code="c">Peking</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1081021292</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applications and techniques in information security</subfield><subfield code="b">6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings</subfield><subfield code="c">Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XVII, 398 Seiten, 147 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">557</subfield><subfield code="x">1865-0929</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Niu, Wenjia</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Gang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Jiqiang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tan, Jianlong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Guo, Li</subfield><subfield code="0">(DE-588)171705777</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Han, Zhen</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batten, Lynn Margaret</subfield><subfield code="d">1948-</subfield><subfield code="0">(DE-588)123824710</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-662-48682-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">557</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">557</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028633063</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-48683-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Peking gnd-content |
genre_facet | Konferenzschrift 2015 Peking |
id | DE-604.BV043209903 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:31:14Z |
institution | BVB |
institution_GND | (DE-588)1081021292 |
isbn | 9783662486832 |
issn | 1865-0929 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028633063 |
oclc_num | 932033314 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (XVII, 398 Seiten, 147 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Communications in Computer and Information Science |
series2 | Communications in computer and information science |
spellingShingle | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Communications in Computer and Information Science Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik |
subject_GND | (DE-588)1071861417 |
title | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
title_auth | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
title_exact_search | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
title_full | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
title_fullStr | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
title_full_unstemmed | Applications and techniques in information security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten (eds.) |
title_short | Applications and techniques in information security |
title_sort | applications and techniques in information security 6th international conference atis 2015 beijing china november 4 6 2015 proceedings |
title_sub | 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings |
topic | Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms Computer Science Systems and Data Security Data Encryption Algorithm Analysis and Problem Complexity Informatik Konferenzschrift 2015 Peking |
url | https://doi.org/10.1007/978-3-662-48683-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028633063&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT atispeking applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT niuwenjia applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT ligang applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT liujiqiang applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT tanjianlong applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT guoli applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT hanzhen applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings AT battenlynnmargaret applicationsandtechniquesininformationsecurity6thinternationalconferenceatis2015beijingchinanovember462015proceedings |