000
|
|
nam5i |
001
|
|
2210080935112 |
003
|
|
DE-He213 |
005
|
|
20250321105459 |
007
|
|
cr nn 008mamaa |
008
|
|
241017s2025 si | s |||| 0|eng d |
020
|
|
▼a9789819785407▼9978-981-97-8540-7 |
024
|
|
▼a10.1007/978-981-97-8540-7▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQA76.9.A25 |
072
|
|
▼aUR▼2bicssc |
072
|
|
▼aUTN▼2bicssc |
072
|
|
▼aCOM053000▼2bisacsh |
072
|
|
▼aUR▼2thema |
072
|
|
▼aUTN▼2thema |
082
|
|
▼a005.8▼223 |
245
|
00 |
▼aData Security and Privacy Protection▼h[electronic resource] :▼bSecond International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part I /▼cedited by Xiaofeng Chen, Xinyi Huang, Moti Yung. |
250
|
|
▼a1st ed. 2025. |
264
|
|
▼aSingapore :▼bSpringer Nature Singapore :▼bImprint: Springer,▼c2025. |
300
|
|
▼aXIV, 314 p. 76 illus., 49 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v15215 |
520
|
|
▼aThis book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024. The 34 full papers included in this volume were carefully reviewed and selected from a total of 99 submissions. The DSPP 2024 conference promotes and stimulates discussion on the latest theories, algorithms, applications, and emerging topics on data security and privacy protection. It encourages the cross-fertilization of ideas and provides a platform for researchers, professionals, and students worldwide to discuss and present their research results. |
650
|
|
▼aData protection. |
650
|
|
▼aData protection▼xLaw and legislation. |
650
|
|
▼aCryptography. |
650
|
|
▼aData encryption (Computer science). |
650
|
|
▼aComputer security. |
650
|
|
▼aComputer networks▼xSecurity measures. |
650
|
|
▼aData and Information Security. |
650
|
|
▼aPrivacy. |
650
|
|
▼aCryptology. |
650
|
|
▼aSecurity Services. |
650
|
|
▼aPrinciples and Models of Security. |
650
|
|
▼aMobile and Network Security. |
700
|
|
▼aChen, Xiaofeng.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aHuang, Xinyi.▼eeditor.▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aYung, Moti.▼eeditor.▼0(orcid)0000-0003-0848-0873▼1https://orcid.org/0000-0003-0848-0873▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9789819785391 |
776
|
|
▼iPrinted edition:▼z9789819785414 |
830
|
|
▼aLecture Notes in Computer Science,▼x1611-3349 ;▼v15215 |
856
|
|
▼uhttps://doi.org/10.1007/978-981-97-8540-7 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
912
|
|
▼aZDB-2-LNC |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |