|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-981-10-2741-3 |
003 |
DE-He213 |
005 |
20220427071702.0 |
007 |
cr nn 008mamaa |
008 |
160926s2016 si | s |||| 0|eng d |
020 |
|
|
|a 9789811027413
|9 978-981-10-2741-3
|
024 |
7 |
|
|a 10.1007/978-981-10-2741-3
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applications and Techniques in Information Security
|h [electronic resource] :
|b 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings /
|c edited by Lynn Batten, Gang Li.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Singapore :
|b Springer Nature Singapore :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XVI, 163 p. 30 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 651
|
505 |
0 |
|
|a Invited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Batten, Lynn.
|e editor.
|0 (orcid)0000-0003-4525-2423
|1 https://orcid.org/0000-0003-4525-2423
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Li, Gang.
|e editor.
|0 (orcid)0000-0003-1583-641X
|1 https://orcid.org/0000-0003-1583-641X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811027406
|
776 |
0 |
8 |
|i Printed edition:
|z 9789811027420
|
830 |
|
0 |
|a Communications in Computer and Information Science,
|x 1865-0937 ;
|v 651
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-981-10-2741-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|