skip to content
Network computing and information security : second international conference : proceedings Preview this item
ClosePreview this item
Checking...

Network computing and information security : second international conference : proceedings

Author: Jingsheng Lei; et al
Publisher: Heidelberg : Springer, 2012.
Series: Communications in computer and information science, 345
Edition/Format:   Print book : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Jingsheng Lei; et al
ISBN: 3642352103 9783642352102 9783642352119 3642352111
OCLC Number: 828074987
Description: 829 S : Ill.
Contents: Applications of Cryptography.- Authentication and Non-repudiation.- Cloud Computing.- Communication and Information Systems.- Design and Analysis of Cryptographic Algorithms.- Information Hiding and Watermarking.- Intelligent Networked Systems.- Multimedia Computing and Intelligence.- Network and Wireless Network Security.- Network Communication.- Parallel and Distributed Systems.- Security Modeling and Architectures.- Sensor Network.- Signal and Information Processing.- Virtualization Techniques and Applications.- Wireless Network.
Series Title: Communications in computer and information science, 345
Responsibility: NCIS 2012, Shanghai, China, December 7-9, 2012 ; Jingsheng Lei ... [et al.] (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/828074987> # Network computing and information security : second international conference : proceedings
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "828074987" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1207077285#Place/heidelberg> ; # Heidelberg
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/authentifikation> ; # Authentifikation
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/regelungssystem> ; # Regelungssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> ; # Elektronische Unterschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> ; # Telekommunikationsnetz
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> ; # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> ; # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> ; # NETWORK MONITORING (COMPUTER SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> ; # Informationssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> ; # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> ; # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> ; # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> ; # Netzwerktopologie
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> ; # Computersicherheit
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> ; # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/anwendungssystem> ; # Anwendungssystem
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> ; # Verteiltes System
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> ; # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> ; # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> ; # CRYPTOGRAPHY (INFORMATION THEORY)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> ; # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/kryptologie> ; # Kryptologie
    schema:about <http://dewey.info/class/005.8/e22/ger/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> ; # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077285#Topic/datensicherung> ; # Datensicherung
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> ; # Jingsheng Lei
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> ; # International Conference on Network Computing and Information Security.
    schema:datePublished "2012" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1207077285> ;
    schema:genre "Kongress" ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> ; # Communications in computer and information science
    schema:name "Network computing and information security : second international conference : proceedings" ;
    schema:productID "828074987" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/828074987#PublicationEvent/heidelberg_springer_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1207077285#Agent/springer> ; # Springer
    schema:url <http://deposit.d-nb.de/cgi-bin/dokserv?id=4168095&prov=M&dok%5Fvar=1&dok%5Fext=htm> ;
    schema:workExample <http://worldcat.org/isbn/9783642352102> ;
    schema:workExample <http://worldcat.org/isbn/9783642352119> ;
    umbel:isLike <http://d-nb.info/102723934X> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/828074987> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1207077285#Meeting/international_conference_on_network_computing_and_information_security> # International Conference on Network Computing and Information Security.
    a bgn:Meeting, schema:Event ;
    schema:name "International Conference on Network Computing and Information Security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Person/lei_jingsheng> # Jingsheng Lei
    a schema:Person ;
    schema:familyName "Lei" ;
    schema:givenName "Jingsheng" ;
    schema:name "Jingsheng Lei" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Series/communications_in_computer_and_information_science> # Communications in computer and information science
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
    schema:name "Communications in computer and information science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/administration_de_systemes_informatiques_gestion_de_systemes_informatiques> # ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
    schema:name "ADMINISTRATION DE SYSTÈMES INFORMATIQUES (GESTION DE SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptographie_theorie_de_l_information> # CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)
    a schema:Thing ;
    schema:name "CRYPTOGRAPHIE (THÉORIE DE L'INFORMATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/cryptography_information_theory> # CRYPTOGRAPHY (INFORMATION THEORY)
    a schema:Thing ;
    schema:name "CRYPTOGRAPHY (INFORMATION THEORY)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/data_security_+_data_protection_operating_systems> # DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
    a schema:Thing ;
    schema:name "DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/datensicherheit_+_datenschutz_betriebssysteme> # DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
    a schema:Thing ;
    schema:name "DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/kryptographie_informationstheorie> # KRYPTOGRAPHIE (INFORMATIONSTHEORIE)
    a schema:Thing ;
    schema:name "KRYPTOGRAPHIE (INFORMATIONSTHEORIE)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/network_monitoring_computer_systems> # NETWORK MONITORING (COMPUTER SYSTEMS)
    a schema:Thing ;
    schema:name "NETWORK MONITORING (COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/netzwerkuberwachung_+_netzwerkadministration_computersysteme> # NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)
    a schema:Thing ;
    schema:name "NETZWERKÜBERWACHUNG + NETZWERKADMINISTRATION (COMPUTERSYSTEME)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/securite_et_protection_des_donnees_systemes_d_exploitation> # SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)
    a schema:Thing ;
    schema:name "SÉCURITÉ ET PROTECTION DES DONNÉES (SYSTÈMES D'EXPLOITATION)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/surveillance_de_reseaux_systemes_informatiques> # SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)
    a schema:Thing ;
    schema:name "SURVEILLANCE DE RÉSEAUX (SYSTÈMES INFORMATIQUES)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/system_management_+_system_administration_management_of_computer_systems> # SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)
    a schema:Thing ;
    schema:name "SYSTEM MANAGEMENT + SYSTEM ADMINISTRATION (MANAGEMENT OF COMPUTER SYSTEMS)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Thing/systemmanagement_+_systemadministration_management_von_computersystemen> # SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)
    a schema:Thing ;
    schema:name "SYSTEMMANAGEMENT + SYSTEMADMINISTRATION (MANAGEMENT VON COMPUTERSYSTEMEN)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/computersicherheit> # Computersicherheit
    a schema:Intangible ;
    schema:name "Computersicherheit" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/elektronische_unterschrift> # Elektronische Unterschrift
    a schema:Intangible ;
    schema:name "Elektronische Unterschrift" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/informationssystem> # Informationssystem
    a schema:Intangible ;
    schema:name "Informationssystem" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/netzwerktopologie> # Netzwerktopologie
    a schema:Intangible ;
    schema:name "Netzwerktopologie" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/telekommunikationsnetz> # Telekommunikationsnetz
    a schema:Intangible ;
    schema:name "Telekommunikationsnetz" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077285#Topic/verteiltes_system> # Verteiltes System
    a schema:Intangible ;
    schema:name "Verteiltes System" ;
    .

<http://worldcat.org/isbn/9783642352102>
    a schema:ProductModel ;
    schema:isbn "3642352103" ;
    schema:isbn "9783642352102" ;
    .

<http://worldcat.org/isbn/9783642352119>
    a schema:ProductModel ;
    schema:description "ebk." ;
    schema:isbn "3642352111" ;
    schema:isbn "9783642352119" ;
    .

<http://www.worldcat.org/title/-/oclc/828074987>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/828074987> ; # Network computing and information security : second international conference : proceedings
    schema:dateModified "2015-04-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.