Property | Value |
dcterms:bibliographicCitation
|
<http://dblp.uni-trier.de/rec/bibtex/conf/icits/2015>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Anja_Lehmann>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Stefan_Wolf_0001>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Anja_Lehmann>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Stefan_Wolf_0001>
|
foaf:homepage
|
<http://dx.doi.org/doi.org%2F10.1007%2F978-3-319-17470-9>
|
foaf:homepage
|
<https://doi.org/10.1007/978-3-319-17470-9>
|
dc:identifier
|
DBLP conf/icits/2015
(xsd:string)
|
dc:identifier
|
DOI doi.org%2F10.1007%2F978-3-319-17470-9
(xsd:string)
|
dc:identifier
|
ISBN 978-3-319-17469-3
(xsd:string)
|
swrc:isbn
|
ISBN 978-3-319-17469-3
(xsd:string)
|
dcterms:issued
|
2015
(xsd:gYear)
|
rdfs:label
|
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
(xsd:string)
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/DahabGM15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/DamgardDN15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/DamgardFMV15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/DavidNRT15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/DemayGMT15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/Ding15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/DowsleyMN15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/FullerH15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/GalbraithS15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/HajiabadiK15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/KishoreKVK15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/MarkhamM15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/OstrovskyP15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/Skorski15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/Skorski15a>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/Walter15>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/icits/WangS15>
|
dc:publisher
|
Springer
(xsd:string)
|
owl:sameAs
|
<http://bibsonomy.org/uri/bibtexkey/conf/icits/2015/dblp>
|
owl:sameAs
|
<http://dblp.rkbexplorer.com/id/conf/icits/2015>
|
owl:sameAs
|
<urn:isbn:978-3-319-17469-3>
|
rdfs:seeAlso
|
<http://amazon.com/s/ref=nb_ss_gw?field-keywords=978-3-319-17469-3>
|
rdfs:seeAlso
|
<https://doi.org/10.1007/978-3-319-17470-9>
|
swrc:series
|
<https://dblp.l3s.de/d2r/resource/conferences/icits>
|
dcterms:tableOfContent
|
<http://dblp.uni-trier.de/db/conf/icits/icits2015.html>
|
dc:title
|
Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
(xsd:string)
|
dc:type
|
<http://purl.org/dc/dcmitype/Collection>
|
rdf:type
|
swrc:Proceedings
|
rdf:type
|
foaf:Document
|
swrc:volume
|
9063
(xsd:string)
|