Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1423
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | ProvSec (Conference) ; (11th : ; 2017 : ; Xi'an Shi, China) ; | en_US |
dc.contributor.author | Okamoto, Tatsuaki, ; editor ; | en_US |
dc.contributor.author | Yu, Yong, ; editor ; | en_US |
dc.contributor.author | Au, Man-Ho, ; editor ; | en_US |
dc.contributor.author | Li, Yannan, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:41Z | - |
dc.date.available | 2020-05-17T08:28:41Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319686370 ; | en_US |
dc.identifier.isbn | 3319686372 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1423 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) | en_US |
dc.format.extent | 1 online resource (xiii, 508 pages) : ; illustrations ; | en_US |
dc.format.extent | International conference proceedings ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10592 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10592. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319686370.pdf | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Provable security : | en_US |
dc.title.alternative | 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / | en_US |
dc.title.alternative | ProvSec 2017 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
dc.classification.dc | 005.82 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319686370.pdf | 9.7 MB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | ProvSec (Conference) ; (11th : ; 2017 : ; Xi'an Shi, China) ; | en_US |
dc.contributor.author | Okamoto, Tatsuaki, ; editor ; | en_US |
dc.contributor.author | Yu, Yong, ; editor ; | en_US |
dc.contributor.author | Au, Man-Ho, ; editor ; | en_US |
dc.contributor.author | Li, Yannan, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:41Z | - |
dc.date.available | 2020-05-17T08:28:41Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319686370 ; | en_US |
dc.identifier.isbn | 3319686372 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1423 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) | en_US |
dc.format.extent | 1 online resource (xiii, 508 pages) : ; illustrations ; | en_US |
dc.format.extent | International conference proceedings ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10592 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10592. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319686370.pdf | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Provable security : | en_US |
dc.title.alternative | 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / | en_US |
dc.title.alternative | ProvSec 2017 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
dc.classification.dc | 005.82 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319686370.pdf | 9.7 MB | Adobe PDF | ![]() Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | ProvSec (Conference) ; (11th : ; 2017 : ; Xi'an Shi, China) ; | en_US |
dc.contributor.author | Okamoto, Tatsuaki, ; editor ; | en_US |
dc.contributor.author | Yu, Yong, ; editor ; | en_US |
dc.contributor.author | Au, Man-Ho, ; editor ; | en_US |
dc.contributor.author | Li, Yannan, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:41Z | - |
dc.date.available | 2020-05-17T08:28:41Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319686370 ; | en_US |
dc.identifier.isbn | 3319686372 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1423 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) | en_US |
dc.format.extent | 1 online resource (xiii, 508 pages) : ; illustrations ; | en_US |
dc.format.extent | International conference proceedings ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10592 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10592. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319686370.pdf | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Provable security : | en_US |
dc.title.alternative | 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / | en_US |
dc.title.alternative | ProvSec 2017 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
dc.classification.dc | 005.82 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319686370.pdf | 9.7 MB | Adobe PDF | ![]() Preview File |