000 | 03479nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-030-61143-9 | ||
003 | DE-He213 | ||
005 | 20240423125425.0 | ||
007 | cr nn 008mamaa | ||
008 | 201105s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030611439 _9978-3-030-61143-9 |
||
024 | 7 |
_a10.1007/978-3-030-61143-9 _2doi |
|
050 | 4 | _aTK7885-7895 | |
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUK _2bicssc |
|
072 | 7 |
_aCOM067000 _2bisacsh |
|
072 | 7 |
_aUK _2thema |
|
082 | 0 | 4 |
_a621.39 _223 |
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aAdvanced Communication Systems and Information Security _h[electronic resource] : _bSecond International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20–22, 2019, Revised Selected Papers / _cedited by Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXV, 251 p. 112 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1264 |
|
505 | 0 | _aWireless Communications and Services -- Vehicular Communications -- Channel Coding -- Construction of Error Correcting Codes -- Intrusion Detection Techniques -- Wireless and Mobile Network Security -- Applied Cryptography. . | |
520 | _aThis book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019. The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography. . | ||
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aApplication software. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 1 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aMathematics of Computing. |
700 | 1 |
_aBelkasmi, Mostafa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBen-Othman, Jalel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLi, Cheng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aEssaaidi, Mohamed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030611422 |
776 | 0 | 8 |
_iPrinted edition: _z9783030611446 |
830 | 0 |
_aCommunications in Computer and Information Science, _x1865-0937 ; _v1264 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-61143-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c177768 _d177768 |