Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ESORICS Online (VerfasserIn)
Weitere Verfasser: Katsikas, Sōkratēs K. 1960- (HerausgeberIn), Cuppens, Frédéric 1962- (HerausgeberIn), Cuppens, Nora (HerausgeberIn), Lambrinoudakis, Costas (HerausgeberIn), Kalloniatis, Christos (HerausgeberIn), Mylopoulos, John P. 1943- (HerausgeberIn), Antón, Annie (HerausgeberIn), Gritzalis, Stefanos (HerausgeberIn), Meng, Weizhi 1986- (HerausgeberIn), Furnell, Steven 1970- (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2020]
Schriftenreihe:Security and cryptology 12501
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV047093551
003 DE-604
005 20221205
007 cr|uuu---uuuuu
008 210119s2020 xx a||| o|||| 10||| eng d
020 |a 9783030643300  |c Online  |9 978-3-030-64330-0 
024 7 |a 10.1007/978-3-030-64330-0  |2 doi 
035 |a (ZDB-2-SCS)9783030643300 
035 |a (ZDB-2-LNC)9783030643300 
035 |a (OCoLC)1232512017 
035 |a (DE-599)BVBBV047093551 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-573  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-384  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 461  |2 stub 
084 |a DAT 460  |2 stub 
084 |a DAT 465  |2 stub 
084 |a DAT 050  |2 stub 
111 2 |a ESORICS  |n 25.  |d 2020  |c Online  |j Verfasser  |0 (DE-588)1219537969  |4 aut 
245 1 0 |a Computer security  |b ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers  |c Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2020] 
300 |a 1 Online-Ressource  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 12501  |a Security and cryptology 
650 4 |a Systems and Data Security 
650 4 |a Information Systems and Communication Service 
650 4 |a Cryptology 
650 4 |a Computer Systems Organization and Communication Networks 
650 4 |a Software Engineering/Programming and Operating Systems 
650 4 |a Computer security 
650 4 |a Computers 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer organization 
650 4 |a Software engineering 
650 0 7 |a Anwendungssoftware  |0 (DE-588)4120906-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2020  |z Online  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 1 |a Anwendungssoftware  |0 (DE-588)4120906-0  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 1 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 |5 DE-604 
689 2 0 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 2 1 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 2 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 2 |5 DE-604 
700 1 |a Katsikas, Sōkratēs K.  |d 1960-  |0 (DE-588)1047133342  |4 edt 
700 1 |a Cuppens, Frédéric  |d 1962-  |0 (DE-588)1246786532  |4 edt 
700 1 |a Cuppens, Nora  |4 edt 
700 1 |a Lambrinoudakis, Costas  |0 (DE-588)1207932337  |4 edt 
700 1 |a Kalloniatis, Christos  |4 edt 
700 1 |a Mylopoulos, John P.  |d 1943-  |0 (DE-588)1089492294  |4 edt 
700 1 |a Antón, Annie  |4 edt 
700 1 |a Gritzalis, Stefanos  |4 edt 
700 1 |a Meng, Weizhi  |d 1986-  |0 (DE-588)1202716857  |4 edt 
700 1 |a Furnell, Steven  |d 1970-  |0 (DE-588)1038562899  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-64329-4 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-64331-7 
830 0 |a Security and cryptology  |v 12501  |w (DE-604)BV014880109  |9 12501 
856 4 0 |u https://doi.org/10.1007/978-3-030-64330-0  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2020 
940 1 |q ZDB-2-LNC_2020 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032500066 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2020  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-355  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-64330-0  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2519058
DE-BY-UBM_katkey 5976857
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-030-64330-0
DE-BY-UBR_katkey 6370759
_version_ 1823057204827127808
adam_text
any_adam_object
author2 Katsikas, Sōkratēs K. 1960-
Cuppens, Frédéric 1962-
Cuppens, Nora
Lambrinoudakis, Costas
Kalloniatis, Christos
Mylopoulos, John P. 1943-
Antón, Annie
Gritzalis, Stefanos
Meng, Weizhi 1986-
Furnell, Steven 1970-
author2_role edt
edt
edt
edt
edt
edt
edt
edt
edt
edt
author2_variant s k k sk skk
f c fc
n c nc
c l cl
c k ck
j p m jp jpm
a a aa
s g sg
w m wm
s f sf
author_GND (DE-588)1047133342
(DE-588)1246786532
(DE-588)1207932337
(DE-588)1089492294
(DE-588)1202716857
(DE-588)1038562899
author_corporate ESORICS Online
author_corporate_role aut
author_facet Katsikas, Sōkratēs K. 1960-
Cuppens, Frédéric 1962-
Cuppens, Nora
Lambrinoudakis, Costas
Kalloniatis, Christos
Mylopoulos, John P. 1943-
Antón, Annie
Gritzalis, Stefanos
Meng, Weizhi 1986-
Furnell, Steven 1970-
ESORICS Online
author_sort ESORICS Online
building Verbundindex
bvnumber BV047093551
classification_rvk SS 4800
classification_tum DAT 461
DAT 460
DAT 465
DAT 050
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030643300
(ZDB-2-LNC)9783030643300
(OCoLC)1232512017
(DE-599)BVBBV047093551
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-64330-0
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV047093551</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221205</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210119s2020 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030643300</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-64330-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-64330-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030643300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030643300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1232512017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047093551</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">25.</subfield><subfield code="d">2020</subfield><subfield code="c">Online</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1219537969</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="b">ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers</subfield><subfield code="c">Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12501</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering/Programming and Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Online</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsikas, Sōkratēs K.</subfield><subfield code="d">1960-</subfield><subfield code="0">(DE-588)1047133342</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuppens, Frédéric</subfield><subfield code="d">1962-</subfield><subfield code="0">(DE-588)1246786532</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuppens, Nora</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lambrinoudakis, Costas</subfield><subfield code="0">(DE-588)1207932337</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalloniatis, Christos</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mylopoulos, John P.</subfield><subfield code="d">1943-</subfield><subfield code="0">(DE-588)1089492294</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Antón, Annie</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gritzalis, Stefanos</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meng, Weizhi</subfield><subfield code="d">1986-</subfield><subfield code="0">(DE-588)1202716857</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1038562899</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-64329-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-64331-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Security and cryptology</subfield><subfield code="v">12501</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">12501</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2020</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032500066</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-64330-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2020 Online gnd-content
genre_facet Konferenzschrift 2020 Online
id DE-604.BV047093551
illustrated Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1219537969
isbn 9783030643300
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032500066
oclc_num 1232512017
open_access_boolean
owner DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2020
ZDB-2-LNC_2020
ZDB-2-LNC ZDB-2-LNC_2020
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Springer
record_format marc
series Security and cryptology
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers
Security and cryptology
Systems and Data Security
Information Systems and Communication Service
Cryptology
Computer Systems Organization and Communication Networks
Software Engineering/Programming and Operating Systems
Computer security
Computers
Data encryption (Computer science)
Computer organization
Software engineering
Anwendungssoftware (DE-588)4120906-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kryptologie (DE-588)4033329-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Privatsphäre (DE-588)4123980-5 gnd
subject_GND (DE-588)4120906-0
(DE-588)4830502-9
(DE-588)4274324-2
(DE-588)4033329-2
(DE-588)4011144-1
(DE-588)4070085-9
(DE-588)4293034-0
(DE-588)4123980-5
(DE-588)1071861417
title Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers
title_auth Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers
title_exact_search Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers
title_full Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell (eds.)
title_fullStr Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell (eds.)
title_full_unstemmed Computer security ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell (eds.)
title_short Computer security
title_sort computer security esorics 2020 international workshops cybericps secpre and adiot guildford uk september 14 18 2020 revised selected papers
title_sub ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14–18, 2020 : revised selected papers
topic Systems and Data Security
Information Systems and Communication Service
Cryptology
Computer Systems Organization and Communication Networks
Software Engineering/Programming and Operating Systems
Computer security
Computers
Data encryption (Computer science)
Computer organization
Software engineering
Anwendungssoftware (DE-588)4120906-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kryptologie (DE-588)4033329-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Privatsphäre (DE-588)4123980-5 gnd
topic_facet Systems and Data Security
Information Systems and Communication Service
Cryptology
Computer Systems Organization and Communication Networks
Software Engineering/Programming and Operating Systems
Computer security
Computers
Data encryption (Computer science)
Computer organization
Software engineering
Anwendungssoftware
Kryptoanalyse
Computersicherheit
Kryptologie
Datensicherung
Rechnernetz
Zugriffskontrolle
Privatsphäre
Konferenzschrift 2020 Online
url https://doi.org/10.1007/978-3-030-64330-0
volume_link (DE-604)BV014880109
work_keys_str_mv AT esoricsonline computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT katsikassokratesk computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT cuppensfrederic computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT cuppensnora computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT lambrinoudakiscostas computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT kalloniatischristos computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT mylopoulosjohnp computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT antonannie computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT gritzalisstefanos computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT mengweizhi computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers
AT furnellsteven computersecurityesorics2020internationalworkshopscybericpssecpreandadiotguildfordukseptember14182020revisedselectedpapers