LEADER 03116nam 22006615 450 001 996465771803316 005 20200704145031.0 010 $a3-319-49151-2 024 7 $a10.1007/978-3-319-49151-6 035 $a(CKB)3710000000981108 035 $a(DE-He213)978-3-319-49151-6 035 $a(MiAaPQ)EBC6304974 035 $a(MiAaPQ)EBC5592602 035 $a(Au-PeEL)EBL5592602 035 $a(OCoLC)962731816 035 $a(PPN)197137164 035 $a(EXLCZ)993710000000981108 100 $a20161104d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Practice and Experience$b[electronic resource] $e12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings /$fedited by Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XII, 380 p. 82 illus.) 225 1 $aSecurity and Cryptology ;$v10060 311 $a3-319-49150-4 327 $aMultiple topics in information security -- Information security in technologies -- Information security in systems -- Applications. 330 $aThis book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications. 410 0$aSecurity and Cryptology ;$v10060 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aBao$b Feng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChen$b Liqun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465771803316 996 $aInformation Security Practice and Experience$9772300 997 $aUNISA