Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applications and techniques in infor...
~
Niu, Wenjia.
Linked to FindBook
Google Book
Amazon
博客來
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Applications and techniques in information security/ edited by Wenjia Niu ... [et al.].
Reminder of title:
6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
other author:
Niu, Wenjia.
Published:
Berlin, Heidelberg :Springer Berlin Heidelberg : : 2015.,
Description:
xvii, 398 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Internet - Congresses. - Security measures -
Online resource:
http://dx.doi.org/10.1007/978-3-662-48683-2
ISBN:
9783662486832
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
Applications and techniques in information security
6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /[electronic resource] :edited by Wenjia Niu ... [et al.]. - Berlin, Heidelberg :Springer Berlin Heidelberg :2015. - xvii, 398 p. :ill., digital ;24 cm. - Communications in computer and information science,5571865-0929 ;. - Communications in computer and information science ;247..
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
ISBN: 9783662486832
Standard No.: 10.1007/978-3-662-48683-2doiSubjects--Topical Terms:
1244281
Internet
--Security measures--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Applications and techniques in information security = 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
LDR
:01705nmm a2200325 a 4500
001
2013160
003
DE-He213
005
20160503114906.0
006
m d
007
cr nn 008maaau
008
160518s2015 gw s 0 eng d
020
$a
9783662486832
$q
(electronic bk.)
020
$a
9783662486825
$q
(paper)
024
7
$a
10.1007/978-3-662-48683-2
$2
doi
035
$a
978-3-662-48683-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A872 2015
245
1 0
$a
Applications and techniques in information security
$h
[electronic resource] :
$b
6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings /
$c
edited by Wenjia Niu ... [et al.].
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2015.
300
$a
xvii, 398 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
557
520
$a
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
1244281
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
1244118
650
0
$a
Computer science.
$3
523869
650
0
$a
Computer security.
$3
540555
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Algorithms.
$3
536374
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Data Encryption.
$3
891254
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
891007
700
1
$a
Niu, Wenjia.
$3
2162500
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Communications in computer and information science ;
$v
247.
$3
1567602
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-48683-2
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9274738
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A872 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login