04008nam 22008295 450 99646596580331620200702173833.03-540-31598-510.1007/11596981(CKB)1000000000232734(SSID)ssj0000492466(PQKBManifestationID)11326132(PQKBTitleCode)TC0000492466(PQKBWorkID)10499611(PQKB)11153779(DE-He213)978-3-540-31598-8(MiAaPQ)EBC3068367(PPN)123098920(EXLCZ)99100000000023273420100505d2005 u| 0engurnn|008mamaatxtccrComputational Intelligence and Security[electronic resource] International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II /edited by Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao1st ed. 2005.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2005.1 online resource (XLII, 1166 p.) Lecture Notes in Artificial Intelligence ;3802Bibliographic Level Mode of Issuance: Monograph3-540-30819-9 Includes bibliographical references and index.Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.Lecture Notes in Artificial Intelligence ;3802Data encryption (Computer science)Artificial intelligenceInformation storage and retrievalApplication softwareComputersAlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computation by Abstract Deviceshttps://scigraph.springernature.com/ontologies/product-market-codes/I16013Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Data encryption (Computer science).Artificial intelligence.Information storage and retrieval.Application software.Computers.Algorithms.Cryptology.Artificial Intelligence.Information Storage and Retrieval.Information Systems Applications (incl. Internet).Computation by Abstract Devices.Algorithm Analysis and Problem Complexity.005.82Hao Yueedthttp://id.loc.gov/vocabulary/relators/edtLiu Jimingedthttp://id.loc.gov/vocabulary/relators/edtWang Yupingedthttp://id.loc.gov/vocabulary/relators/edtCheung Yiu-mingedthttp://id.loc.gov/vocabulary/relators/edtYin Hujunedthttp://id.loc.gov/vocabulary/relators/edtJiao Lichengedthttp://id.loc.gov/vocabulary/relators/edtMa Jianfengedthttp://id.loc.gov/vocabulary/relators/edtJiao Yong-Changedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465965803316Computational Intelligence and Security771952UNISA