LEADER 04008nam 22008295 450 001 996465965803316 005 20200702173833.0 010 $a3-540-31598-5 024 7 $a10.1007/11596981 035 $a(CKB)1000000000232734 035 $a(SSID)ssj0000492466 035 $a(PQKBManifestationID)11326132 035 $a(PQKBTitleCode)TC0000492466 035 $a(PQKBWorkID)10499611 035 $a(PQKB)11153779 035 $a(DE-He213)978-3-540-31598-8 035 $a(MiAaPQ)EBC3068367 035 $a(PPN)123098920 035 $a(EXLCZ)991000000000232734 100 $a20100505d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputational Intelligence and Security$b[electronic resource] $eInternational Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II /$fedited by Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XLII, 1166 p.) 225 1 $aLecture Notes in Artificial Intelligence ;$v3802 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-30819-9 320 $aIncludes bibliographical references and index. 327 $aCryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications. 410 0$aLecture Notes in Artificial Intelligence ;$v3802 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aInformation storage and retrieval 606 $aApplication software 606 $aComputers 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 0$aInformation storage and retrieval. 615 0$aApplication software. 615 0$aComputers. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aArtificial Intelligence. 615 24$aInformation Storage and Retrieval. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputation by Abstract Devices. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.82 702 $aHao$b Yue$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Jiming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Yuping$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCheung$b Yiu-ming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYin$b Hujun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJiao$b Licheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMa$b Jianfeng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJiao$b Yong-Chang$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465965803316 996 $aComputational Intelligence and Security$9771952 997 $aUNISA