Emerging challenges for security, privacy and trust proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin ; Heidelberg ; New York, NY Springer 2009
Schriftenreihe:IFIP advances in information and communication technology 297
Schlagworte:
Online-Zugang:DE-634
DE-M347
DE-473
DE-703
DE-706
DE-739
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV035621787
003 DE-604
005 20200813
007 cr|uuu---uuuuu
008 090710s2009 gw ad|| o|||| 10||| eng d
015 |a 09,N13,0018  |2 dnb 
015 |a 09,A28,0021  |2 dnb 
016 7 |a 99313632X  |2 DE-101 
020 |a 3642012434  |9 3-642-01243-4 
020 |a 9783642012433  |c Pp. : EUR 160.45(freier Pr.), ca. sfr 270.00 (freier Pr.)  |9 978-3-642-01243-3 
020 |a 9783642012440  |c Online  |9 978-3-642-01244-0 
024 7 |a 10.1007/978-3-642-01244-0  |2 doi 
024 3 |a 9783642012433 
028 5 2 |a 12659401 
035 |a (OCoLC)873598440 
035 |a (DE-599)DNB99313632X 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-473  |a DE-M347  |a DE-703  |a DE-706  |a DE-634  |a DE-739 
082 0 |a 005.8 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a 004  |2 sdnb 
245 1 0 |a Emerging challenges for security, privacy and trust  |b proceedings  |c 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18 - 20, 2009. Dimitris Gritzalis ; Javier Lopez (ed.) 
264 1 |a Berlin ; Heidelberg ; New York, NY  |b Springer  |c 2009 
300 |a 1 Online-Ressource (XIV, 444 S.)  |b Ill., graph. Darst.  |c 24 cm 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a IFIP advances in information and communication technology  |v 297 
500 |a Literaturangaben 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Automatische Identifikation  |0 (DE-588)4206098-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Trusted Computing  |0 (DE-588)7562931-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenschutz  |0 (DE-588)4011134-9  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2009  |z Paphos Ktima  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 1 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 1 |5 DE-604 
689 2 0 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 2 1 |a Datenschutz  |0 (DE-588)4011134-9  |D s 
689 2 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 2 |5 DE-604 
689 3 0 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 3 1 |a Automatische Identifikation  |0 (DE-588)4206098-9  |D s 
689 3 |5 DE-604 
689 4 0 |a Trusted Computing  |0 (DE-588)7562931-8  |D s 
689 4 |5 DE-604 
700 1 |a Gritzalis, Dimitris  |d 1959-  |e Sonstige  |0 (DE-588)1059494035  |4 oth 
710 2 |a International Federation for Information Processing  |b Technical Committee Security and Privacy Protection in Information Processing Systems  |e Sonstige  |0 (DE-588)10360013-9  |4 oth 
711 2 |a International Information Security Conference  |n 24  |d 2009  |c Paphos  |j Sonstige  |0 (DE-588)16010243-1  |4 oth 
830 0 |a IFIP advances in information and communication technology  |v 297  |w (DE-604)BV035839733  |9 297 
856 4 0 |u https://doi.org/10.1007/978-3-642-01244-0  |x Verlag  |3 Volltext 
912 |a ZDB-2-SCS 
942 1 1 |c 005.8  |e 22/bsb 
943 1 |a oai:aleph.bib-bvb.de:BVB01-017676916 
966 e |u https://doi.org/10.1007/978-3-642-01244-0  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-01244-0  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-01244-0  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-01244-0  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-01244-0  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-642-01244-0  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819270427217756160
any_adam_object
author_GND (DE-588)1059494035
building Verbundindex
bvnumber BV035621787
classification_rvk ST 276
collection ZDB-2-SCS
ctrlnum (OCoLC)873598440
(DE-599)DNB99313632X
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-642-01244-0
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04177nam a2200889 cb4500</leader><controlfield tag="001">BV035621787</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200813 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">090710s2009 gw ad|| o|||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N13,0018</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,A28,0021</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">99313632X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642012434</subfield><subfield code="9">3-642-01243-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642012433</subfield><subfield code="c">Pp. : EUR 160.45(freier Pr.), ca. sfr 270.00 (freier Pr.)</subfield><subfield code="9">978-3-642-01243-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642012440</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-01244-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-01244-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642012433</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12659401</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)873598440</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB99313632X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Emerging challenges for security, privacy and trust</subfield><subfield code="b">proceedings</subfield><subfield code="c">24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18 - 20, 2009. Dimitris Gritzalis ; Javier Lopez (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 444 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IFIP advances in information and communication technology</subfield><subfield code="v">297</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Paphos Ktima</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Automatische Identifikation</subfield><subfield code="0">(DE-588)4206098-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gritzalis, Dimitris</subfield><subfield code="d">1959-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1059494035</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Federation for Information Processing</subfield><subfield code="b">Technical Committee Security and Privacy Protection in Information Processing Systems</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)10360013-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Information Security Conference</subfield><subfield code="n">24</subfield><subfield code="d">2009</subfield><subfield code="c">Paphos</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16010243-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IFIP advances in information and communication technology</subfield><subfield code="v">297</subfield><subfield code="w">(DE-604)BV035839733</subfield><subfield code="9">297</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">005.8</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017676916</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-01244-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2009 Paphos Ktima gnd-content
genre_facet Konferenzschrift 2009 Paphos Ktima
id DE-604.BV035621787
illustrated Illustrated
indexdate 2024-12-23T22:04:36Z
institution BVB
institution_GND (DE-588)10360013-9
(DE-588)16010243-1
isbn 3642012434
9783642012433
9783642012440
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-017676916
oclc_num 873598440
open_access_boolean
owner DE-473
DE-BY-UBG
DE-M347
DE-703
DE-706
DE-634
DE-739
owner_facet DE-473
DE-BY-UBG
DE-M347
DE-703
DE-706
DE-634
DE-739
physical 1 Online-Ressource (XIV, 444 S.) Ill., graph. Darst. 24 cm
psigel ZDB-2-SCS
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher Springer
record_format marc
series IFIP advances in information and communication technology
series2 IFIP advances in information and communication technology
spelling Emerging challenges for security, privacy and trust proceedings 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18 - 20, 2009. Dimitris Gritzalis ; Javier Lopez (ed.)
Berlin ; Heidelberg ; New York, NY Springer 2009
1 Online-Ressource (XIV, 444 S.) Ill., graph. Darst. 24 cm
txt rdacontent
c rdamedia
cr rdacarrier
IFIP advances in information and communication technology 297
Literaturangaben
Rechnernetz (DE-588)4070085-9 gnd rswk-swf
Automatische Identifikation (DE-588)4206098-9 gnd rswk-swf
Authentifikation (DE-588)4330656-1 gnd rswk-swf
Privatsphäre (DE-588)4123980-5 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Trusted Computing (DE-588)7562931-8 gnd rswk-swf
Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Kryptosystem (DE-588)4209132-9 gnd rswk-swf
Datenschutz (DE-588)4011134-9 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2009 Paphos Ktima gnd-content
Rechnernetz (DE-588)4070085-9 s
Computersicherheit (DE-588)4274324-2 s
Datensicherung (DE-588)4011144-1 s
DE-604
Kryptoanalyse (DE-588)4830502-9 s
Kryptosystem (DE-588)4209132-9 s
Privatsphäre (DE-588)4123980-5 s
Datenschutz (DE-588)4011134-9 s
Authentifikation (DE-588)4330656-1 s
Automatische Identifikation (DE-588)4206098-9 s
Trusted Computing (DE-588)7562931-8 s
Gritzalis, Dimitris 1959- Sonstige (DE-588)1059494035 oth
International Federation for Information Processing Technical Committee Security and Privacy Protection in Information Processing Systems Sonstige (DE-588)10360013-9 oth
International Information Security Conference 24 2009 Paphos Sonstige (DE-588)16010243-1 oth
IFIP advances in information and communication technology 297 (DE-604)BV035839733 297
https://doi.org/10.1007/978-3-642-01244-0 Verlag Volltext
spellingShingle Emerging challenges for security, privacy and trust proceedings
IFIP advances in information and communication technology
Rechnernetz (DE-588)4070085-9 gnd
Automatische Identifikation (DE-588)4206098-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Privatsphäre (DE-588)4123980-5 gnd
Computersicherheit (DE-588)4274324-2 gnd
Trusted Computing (DE-588)7562931-8 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptosystem (DE-588)4209132-9 gnd
Datenschutz (DE-588)4011134-9 gnd
subject_GND (DE-588)4070085-9
(DE-588)4206098-9
(DE-588)4330656-1
(DE-588)4123980-5
(DE-588)4274324-2
(DE-588)7562931-8
(DE-588)4830502-9
(DE-588)4011144-1
(DE-588)4209132-9
(DE-588)4011134-9
(DE-588)1071861417
title Emerging challenges for security, privacy and trust proceedings
title_auth Emerging challenges for security, privacy and trust proceedings
title_exact_search Emerging challenges for security, privacy and trust proceedings
title_full Emerging challenges for security, privacy and trust proceedings 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18 - 20, 2009. Dimitris Gritzalis ; Javier Lopez (ed.)
title_fullStr Emerging challenges for security, privacy and trust proceedings 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18 - 20, 2009. Dimitris Gritzalis ; Javier Lopez (ed.)
title_full_unstemmed Emerging challenges for security, privacy and trust proceedings 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18 - 20, 2009. Dimitris Gritzalis ; Javier Lopez (ed.)
title_short Emerging challenges for security, privacy and trust
title_sort emerging challenges for security privacy and trust proceedings
title_sub proceedings
topic Rechnernetz (DE-588)4070085-9 gnd
Automatische Identifikation (DE-588)4206098-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Privatsphäre (DE-588)4123980-5 gnd
Computersicherheit (DE-588)4274324-2 gnd
Trusted Computing (DE-588)7562931-8 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptosystem (DE-588)4209132-9 gnd
Datenschutz (DE-588)4011134-9 gnd
topic_facet Rechnernetz
Automatische Identifikation
Authentifikation
Privatsphäre
Computersicherheit
Trusted Computing
Kryptoanalyse
Datensicherung
Kryptosystem
Datenschutz
Konferenzschrift 2009 Paphos Ktima
url https://doi.org/10.1007/978-3-642-01244-0
volume_link (DE-604)BV035839733
work_keys_str_mv AT gritzalisdimitris emergingchallengesforsecurityprivacyandtrustproceedings
AT internationalfederationforinformationprocessingtechnicalcommitteesecurityandprivacyprotectionininformationprocessingsystems emergingchallengesforsecurityprivacyandtrustproceedings
AT internationalinformationsecurityconferencepaphos emergingchallengesforsecurityprivacyandtrustproceedings