Information systems security: 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings
Saved in:
Corporate Author: | |
---|---|
Other Authors: | |
Format: | Conference Proceedings Book |
Language: | English |
Published: |
Cham
Springer
[2017]
|
Series: | Lecture notes in computer science
10717 |
Subjects: | |
Physical Description: | XI, 414 Seiten Diagramme |
ISBN: | 9783319725970 |
Staff View
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044704644 | ||
003 | DE-604 | ||
005 | 20181219 | ||
007 | t| | ||
008 | 180109s2017 xx |||| |||| 10||| eng d | ||
020 | |a 9783319725970 |9 978-3-319-72597-0 | ||
035 | |a (OCoLC)1018483907 | ||
035 | |a (DE-599)BVBBV044704644 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
111 | 2 | |a ICISS |n 13. |d 2017 |c Mumbai |j Verfasser |0 (DE-588)115024660X |4 aut | |
245 | 1 | 0 | |a Information systems security |b 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings |c Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) |
264 | 1 | |a Cham |b Springer |c [2017] | |
300 | |a XI, 414 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10717 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computers | |
650 | 4 | |a Law and legislation | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Security | |
650 | 4 | |a Data Structures, Cryptology and Information Theory | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Legal Aspects of Computing | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 3 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 4 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Shyamasundar, Rudrapatna K. |d 1950- |0 (DE-588)113120591 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-72598-7 |
830 | 0 | |a Lecture notes in computer science |v 10717 |w (DE-604)BV000000607 |9 10717 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030101297 |
Record in the Search Index
_version_ | 1820980685759840256 |
---|---|
adam_text | |
any_adam_object | |
author2 | Shyamasundar, Rudrapatna K. 1950- |
author2_role | edt |
author2_variant | r k s rk rks |
author_GND | (DE-588)113120591 |
author_corporate | ICISS Mumbai |
author_corporate_role | aut |
author_facet | Shyamasundar, Rudrapatna K. 1950- ICISS Mumbai |
author_sort | ICISS Mumbai |
building | Verbundindex |
bvnumber | BV044704644 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)1018483907 (DE-599)BVBBV044704644 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044704644</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20181219</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180109s2017 xx |||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319725970</subfield><subfield code="9">978-3-319-72597-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1018483907</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044704644</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ICISS</subfield><subfield code="n">13.</subfield><subfield code="d">2017</subfield><subfield code="c">Mumbai</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)115024660X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings</subfield><subfield code="c">Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 414 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10717</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures, Cryptology and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Legal Aspects of Computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shyamasundar, Rudrapatna K.</subfield><subfield code="d">1950-</subfield><subfield code="0">(DE-588)113120591</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-72598-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10717</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10717</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030101297</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044704644 |
illustrated | Not Illustrated |
indexdate | 2025-01-11T19:08:30Z |
institution | BVB |
institution_GND | (DE-588)115024660X |
isbn | 9783319725970 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030101297 |
oclc_num | 1018483907 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XI, 414 Seiten Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ICISS 13. 2017 Mumbai Verfasser (DE-588)115024660X aut Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) Cham Springer [2017] XI, 414 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10717 Computer science Computer communication systems Data structures (Computer science) Computers and civilization Computers Law and legislation Computer Science Security Data Structures, Cryptology and Information Theory Computers and Society Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) Kryptosystem (DE-588)4209132-9 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Rechnernetz (DE-588)4070085-9 s Informationssystem (DE-588)4072806-7 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Kryptologie (DE-588)4033329-2 s Verteiltes System (DE-588)4238872-7 s Anwendungssystem (DE-588)4139375-2 s Kryptosystem (DE-588)4209132-9 s Shyamasundar, Rudrapatna K. 1950- (DE-588)113120591 edt Erscheint auch als Online-Ausgabe 978-3-319-72598-7 Lecture notes in computer science 10717 (DE-604)BV000000607 10717 |
spellingShingle | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings Lecture notes in computer science Computer science Computer communication systems Data structures (Computer science) Computers and civilization Computers Law and legislation Computer Science Security Data Structures, Cryptology and Information Theory Computers and Society Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) Kryptosystem (DE-588)4209132-9 gnd Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd Informationssystem (DE-588)4072806-7 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Anwendungssystem (DE-588)4139375-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4238872-7 (DE-588)4274324-2 (DE-588)4072806-7 (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4293034-0 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4139375-2 (DE-588)1071861417 |
title | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings |
title_auth | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings |
title_exact_search | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings |
title_full | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) |
title_fullStr | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) |
title_full_unstemmed | Information systems security 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) |
title_short | Information systems security |
title_sort | information systems security 13th international conference iciss 2017 mumbai india december 16 20 2017 proceedings |
title_sub | 13th international conference, ICISS 2017, Mumbai, India, December 16-20, 2017 : proceedings |
topic | Computer science Computer communication systems Data structures (Computer science) Computers and civilization Computers Law and legislation Computer Science Security Data Structures, Cryptology and Information Theory Computers and Society Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) Kryptosystem (DE-588)4209132-9 gnd Verteiltes System (DE-588)4238872-7 gnd Computersicherheit (DE-588)4274324-2 gnd Informationssystem (DE-588)4072806-7 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Anwendungssystem (DE-588)4139375-2 gnd |
topic_facet | Computer science Computer communication systems Data structures (Computer science) Computers and civilization Computers Law and legislation Computer Science Security Data Structures, Cryptology and Information Theory Computers and Society Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) Kryptosystem Verteiltes System Computersicherheit Informationssystem Kryptologie Datensicherung Rechnernetz Zugriffskontrolle Authentifikation Privatsphäre Anwendungssystem Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT icissmumbai informationsystemssecurity13thinternationalconferenceiciss2017mumbaiindiadecember16202017proceedings AT shyamasundarrudrapatnak informationsystemssecurity13thinternationalconferenceiciss2017mumbaiindiadecember16202017proceedings |