LEADER 03885nam 22008055 450 001 996466231203316 005 20200630092215.0 010 $a3-319-26961-5 024 7 $a10.1007/978-3-319-26961-0 035 $a(CKB)4340000000001227 035 $a(SSID)ssj0001599542 035 $a(PQKBManifestationID)16306019 035 $a(PQKBTitleCode)TC0001599542 035 $a(PQKBWorkID)14892398 035 $a(PQKB)10276297 035 $a(DE-He213)978-3-319-26961-0 035 $a(MiAaPQ)EBC6281457 035 $a(MiAaPQ)EBC5578356 035 $a(Au-PeEL)EBL5578356 035 $a(OCoLC)933389103 035 $a(PPN)190884681 035 $a(EXLCZ)994340000000001227 100 $a20151216d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Security$b[electronic resource] $e11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings /$fedited by Sushil Jajoda, Chandan Mazumdar 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XVI, 584 p. 156 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9478 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-26960-7 327 $aAccess control -- Attacks and mitigation -- Cloud security -- Crypto systems and protocols -- Information flow control -- Sensor networks and cognitive radio -- Watermarking and steganography. 330 $aThis book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography. 410 0$aSecurity and Cryptology ;$v9478 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aJajoda$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMazumdar$b Chandan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466231203316 996 $aInformation Systems Security$9771916 997 $aUNISA LEADER 01865oam 2200457 450 001 9910704922903321 005 20140227150054.0 035 $a(CKB)5470000002446519 035 $a(OCoLC)865544874 035 $a(EXLCZ)995470000002446519 100 $a20131218d2013 ua 0 101 0 $aeng 135 $aurbn||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aReligious minorities in Syria $ecaught in the middle : joint hearing before the Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations and the Subcommittee on The Middle East and North Africa of the Committee on Foreign Affairs, House of Representatives, One Hundred Thirteenth Congress, first session, June 25, 2013 210 1$aWashington, D.C. :$cU.S. Government Printing Office,$d2013. 215 $a1 online resource (iii, 140 pages).$cillustrations 300 $aTitle from title screen (viewed on Dec.17, 2013). 300 $a"June 26, 2013." 300 $aPaper version available for sale by the Superintendent of Documents, U.S. Government Printing Office. 300 $a"Serial no. 113-75." 320 $aIncludes bibliographical references. 517 $aReligious minorities in Syria 606 $aReligious minorities$zSyria 606 $aEthnicity$zSyria 606 $aHuman rights$zSyria 607 $aSyria$xPolitics and government 608 $aLegislative hearings.$2lcgft 615 0$aReligious minorities 615 0$aEthnicity 615 0$aHuman rights 712 02$aUnited States.$bCongress.$bHouse.$bCommittee on Foreign Affairs.$bSubcommittee on the Middle East and North Africa, 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910704922903321 996 $aReligious minorities in Syria$93444557 997 $aUNINA LEADER 02863nam 22006855 450 001 9910427700003321 005 20251113211447.0 010 $a981-15-9609-3 024 7 $a10.1007/978-981-15-9609-4 035 $a(CKB)4100000011558725 035 $a(DE-He213)978-981-15-9609-4 035 $a(MiAaPQ)EBC6382721 035 $a(PPN)252504089 035 $a(EXLCZ)994100000011558725 100 $a20201101d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMobile Internet Security $e4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17?19, 2019, Revised Selected Papers /$fedited by Ilsun You, Hsing-Chung Chen, Fang-Yie Leu, Igor Kotenko 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 187 p. 31 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1121 311 08$a981-15-9608-5 327 $aMobile Internet Security -- Mobile Application and Security -- Vehicular Network Security -- Deep Learning Applications. 330 $aThis book constitutes the refereed proceedings of the 4th International Symposium on Mobile Internet Security, MobiSec 2019, held in Taichung, Taiwan, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in the topical sections: mobile internet security; mobile application and security; vehicular network security; deep learning applications. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1121 606 $aComputer science 606 $aData protection 606 $aComputer networks 606 $aData structures (Computer science) 606 $aInformation theory 606 $aArtificial intelligence 606 $aComputer Science 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aData Structures and Information Theory 606 $aArtificial Intelligence 615 0$aComputer science. 615 0$aData protection. 615 0$aComputer networks. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aArtificial intelligence. 615 14$aComputer Science. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aData Structures and Information Theory. 615 24$aArtificial Intelligence. 676 $a004.67 702 $aYou$b Ilsun 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427700003321 996 $aMobile Internet Security$91961597 997 $aUNINA