skip to content
Network computing and information security : second international conference : proceedings Preview this item
ClosePreview this item
Checking...

Network computing and information security : second international conference : proceedings

Author: Jingsheng Lei; et al
Publisher: Heidelberg : Springer, 2012.
Series: Communications in computer and information science, 345
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Jingsheng Lei; et al
ISBN: 3642352103 9783642352102 9783642352119 3642352111
OCLC Number: 828074987
Description: 829 S : Ill.
Contents: Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.
Series Title: Communications in computer and information science, 345
Responsibility: NCIS 2012, Shanghai, China, December 7-9, 2012 ; Jingsheng Lei ... [et al.] (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/828074987> # Network computing and information security : second international conference : proceedings
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "828074987" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1207077285#Place/heidelberg> ; # Heidelberg
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/authentifikation> ; # Authentifikation
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/regelungssystem> ; # Regelungssystem
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> ; # Telekommunikationsnetz
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> ; # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> ; # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> ; # NETWORK MONITORING (COMPUTER SYSTEMS)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> ; # Informationssystem
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> ; # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> ; # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> ; # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> ; # Netzwerktopologie
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> ; # Computersicherheit
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> ; # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/anwendungssystem> ; # Anwendungssystem
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> ; # Verteiltes System
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> ; # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> ; # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> ; # CRYPTOGRAPHY (INFORMATION THEORY)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> ; # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/kryptologie> ; # Kryptologie
   schema:about <http://dewey.info/class/005.8/e22/ger/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> ; # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
   schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/datensicherung> ; # Datensicherung
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> ; # Jingsheng Lei
   schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> ; # International Conference on Network Computing and Information Security.
   schema:datePublished "2012" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1207077285> ;
   schema:genre "Kongress" ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> ; # Communications in computer and information science
   schema:name "Network computing and information security : second international conference : proceedings" ;
   schema:productID "828074987" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/828074987#PublicationEvent/heidelberg_springer_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1207077285#Agent/springer> ; # Springer
   schema:url <http://deposit.d-nb.de/cgi-bin/dokserv?id=4168095&prov=M&dok%5Fvar=1&dok%5Fext=htm> ;
   schema:workExample <http://worldcat.org/isbn/9783642352102> ;
   schema:workExample <http://worldcat.org/isbn/9783642352119> ;
   umbel:isLike <http://d-nb.info/102723934X> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/828074987> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> # International Conference on Network Computing and Information Security.
    a bgn:Meeting, schema:Event ;
   schema:name "International Conference on Network Computing and Information Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> # Jingsheng Lei
    a schema:Person ;
   schema:familyName "Lei" ;
   schema:givenName "Jingsheng" ;
   schema:name "Jingsheng Lei" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> # Communications in computer and information science
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
   schema:name "Communications in computer and information science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
   schema:name "ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    a schema:Thing ;
   schema:name "CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> # CRYPTOGRAPHY (INFORMATION THEORY)
    a schema:Thing ;
   schema:name "CRYPTOGRAPHY (INFORMATION THEORY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    a schema:Thing ;
   schema:name "DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    a schema:Thing ;
   schema:name "DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    a schema:Thing ;
   schema:name "KRYPTOGRAPHIE (INFORMATIONSTHEORIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> # NETWORK MONITORING (COMPUTER SYSTEMS)
    a schema:Thing ;
   schema:name "NETWORK MONITORING (COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    a schema:Thing ;
   schema:name "NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    a schema:Thing ;
   schema:name "SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
   schema:name "SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    a schema:Thing ;
   schema:name "SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    a schema:Thing ;
   schema:name "SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
   schema:name "Elektronische Unterschrift" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> # Telekommunikationsnetz
    a schema:Intangible ;
   schema:name "Telekommunikationsnetz" ;
    .

<http://worldcat.org/isbn/9783642352102>
    a schema:ProductModel ;
   schema:isbn "3642352103" ;
   schema:isbn "9783642352102" ;
    .

<http://worldcat.org/isbn/9783642352119>
    a schema:ProductModel ;
   schema:description "ebk." ;
   schema:isbn "3642352111" ;
   schema:isbn "9783642352119" ;
    .

<http://www.worldcat.org/title/-/oclc/828074987>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
   schema:dateModified "2016-05-11" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.