Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1475
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | ICITS (Conference) ; (10th : ; 2017 : ; Hong Kong, China) ; | en_US |
dc.contributor.author | Shikata, Junji, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:29:04Z | - |
dc.date.available | 2020-05-17T08:29:04Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319720890 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 3319720899 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 9783319720883 ; (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1475 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Junji Shikata (ed.) | en_US |
dc.format.extent | 1 online resource (xii, 235 pages) : ; illustrations ; | en_US |
dc.format.extent | International conference proceedings ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10681 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10681. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319720890.pdf | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Information theoretic security : | en_US |
dc.title.alternative | 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings / | en_US |
dc.title.alternative | ICITS 2017 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319720890.pdf | 7.22 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | ICITS (Conference) ; (10th : ; 2017 : ; Hong Kong, China) ; | en_US |
dc.contributor.author | Shikata, Junji, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:29:04Z | - |
dc.date.available | 2020-05-17T08:29:04Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319720890 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 3319720899 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 9783319720883 ; (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1475 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Junji Shikata (ed.) | en_US |
dc.format.extent | 1 online resource (xii, 235 pages) : ; illustrations ; | en_US |
dc.format.extent | International conference proceedings ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10681 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10681. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319720890.pdf | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Information theoretic security : | en_US |
dc.title.alternative | 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings / | en_US |
dc.title.alternative | ICITS 2017 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319720890.pdf | 7.22 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | ICITS (Conference) ; (10th : ; 2017 : ; Hong Kong, China) ; | en_US |
dc.contributor.author | Shikata, Junji, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:29:04Z | - |
dc.date.available | 2020-05-17T08:29:04Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319720890 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 3319720899 ; (electronic bk.) ; | en_US |
dc.identifier.isbn | 9783319720883 ; (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1475 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.statementofresponsibility | Junji Shikata (ed.) | en_US |
dc.format.extent | 1 online resource (xii, 235 pages) : ; illustrations ; | en_US |
dc.format.extent | International conference proceedings ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10681 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10681. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319720890.pdf | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Information theoretic security : | en_US |
dc.title.alternative | 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings / | en_US |
dc.title.alternative | ICITS 2017 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319720890.pdf | 7.22 MB | Adobe PDF | Preview File |