Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: International Conference on Security, Privacy, and Applied Cryptography Engineering Online (VerfasserIn)
Weitere Verfasser: Batina, Lejla (HerausgeberIn), Picek, Stjepan (HerausgeberIn), Mondal, Mainack (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2020]
Schriftenreihe:Lecture notes in computer science 12586
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV047093592
003 DE-604
005 20220207
007 cr|uuu---uuuuu
008 210119s2020 xx a||| o|||| 10||| eng d
020 |a 9783030666262  |c Online  |9 978-3-030-66626-2 
024 7 |a 10.1007/978-3-030-66626-2  |2 doi 
035 |a (ZDB-2-SCS)9783030666262 
035 |a (ZDB-2-LNC)9783030666262 
035 |a (OCoLC)1232516291 
035 |a (DE-599)BVBBV047093592 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-573  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-384  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 465  |2 stub 
084 |a DAT 000  |2 stub 
111 2 |a International Conference on Security, Privacy, and Applied Cryptography Engineering  |n 10.  |d 2020  |c Online  |j Verfasser  |0 (DE-588)1226702503  |4 aut 
245 1 0 |a Security, privacy, and applied cryptography engineering  |b 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings  |c Lejla Batina, Stjepan Picek, Mainack Mondal (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2020] 
300 |a 1 Online-Ressource (x, 259 Seiten)  |b 87 Illustrationen, 37 in Farbe 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 12586  |a Security and cryptology 
650 4 |a Systems and Data Security 
650 4 |a Computer Systems Organization and Communication Networks 
650 4 |a Security Services 
650 4 |a Information Systems and Communication Service 
650 4 |a Coding and Information Theory 
650 4 |a Computer security 
650 4 |a Computer organization 
650 4 |a Computers 
650 4 |a Coding theory 
650 4 |a Information theory 
650 0 7 |a Informationstheorie  |0 (DE-588)4026927-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Codierungstheorie  |0 (DE-588)4139405-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Anonymisierung  |0 (DE-588)4139362-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensatz  |0 (DE-588)4011133-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Wissensextraktion  |0 (DE-588)4546354-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2020  |z Online  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Codierungstheorie  |0 (DE-588)4139405-7  |D s 
689 0 2 |a Informationstheorie  |0 (DE-588)4026927-9  |D s 
689 0 3 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Wissensextraktion  |0 (DE-588)4546354-2  |D s 
689 1 1 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 1 2 |a Anonymisierung  |0 (DE-588)4139362-4  |D s 
689 1 3 |a Datensatz  |0 (DE-588)4011133-7  |D s 
689 1 |5 DE-604 
700 1 |a Batina, Lejla  |0 (DE-588)1060230399  |4 edt 
700 1 |a Picek, Stjepan  |4 edt 
700 1 |a Mondal, Mainack  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-66625-5 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-66627-9 
830 0 |a Lecture notes in computer science  |v 12586  |w (DE-604)BV014880109  |9 12586 
856 4 0 |u https://doi.org/10.1007/978-3-030-66626-2  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2020 
940 1 |q ZDB-2-LNC_2020 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032500107 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2020  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-355  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-66626-2  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2519099
DE-BY-UBG_katkey 196730685
DE-BY-UBG_local_url https://doi.org/10.1007/978-3-030-66626-2
Verlag
DE-BY-UBM_katkey 5976898
DE-BY-UBM_local_url https://doi.org/10.1007/978-3-030-66626-2
Verlag
DE-BY-UBR_katkey 6370801
_version_ 1824053727879757824
adam_text
any_adam_object
author2 Batina, Lejla
Picek, Stjepan
Mondal, Mainack
author2_role edt
edt
edt
author2_variant l b lb
s p sp
m m mm
author_GND (DE-588)1060230399
author_corporate International Conference on Security, Privacy, and Applied Cryptography Engineering Online
author_corporate_role aut
author_facet Batina, Lejla
Picek, Stjepan
Mondal, Mainack
International Conference on Security, Privacy, and Applied Cryptography Engineering Online
author_sort International Conference on Security, Privacy, and Applied Cryptography Engineering Online
building Verbundindex
bvnumber BV047093592
classification_rvk SS 4800
classification_tum DAT 465
DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030666262
(ZDB-2-LNC)9783030666262
(OCoLC)1232516291
(DE-599)BVBBV047093592
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-66626-2
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV047093592</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220207</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210119s2020 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030666262</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-66626-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-66626-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030666262</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030666262</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1232516291</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047093592</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">International Conference on Security, Privacy, and Applied Cryptography Engineering</subfield><subfield code="n">10.</subfield><subfield code="d">2020</subfield><subfield code="c">Online</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1226702503</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy, and applied cryptography engineering</subfield><subfield code="b">10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings</subfield><subfield code="c">Lejla Batina, Stjepan Picek, Mainack Mondal (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 259 Seiten)</subfield><subfield code="b">87 Illustrationen, 37 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12586</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensatz</subfield><subfield code="0">(DE-588)4011133-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Online</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Codierungstheorie</subfield><subfield code="0">(DE-588)4139405-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Wissensextraktion</subfield><subfield code="0">(DE-588)4546354-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensatz</subfield><subfield code="0">(DE-588)4011133-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batina, Lejla</subfield><subfield code="0">(DE-588)1060230399</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Picek, Stjepan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mondal, Mainack</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-66625-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-66627-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12586</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">12586</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2020</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032500107</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66626-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2020 Online gnd-content
genre_facet Konferenzschrift 2020 Online
id DE-604.BV047093592
illustrated Illustrated
indexdate 2025-02-14T18:11:05Z
institution BVB
institution_GND (DE-588)1226702503
isbn 9783030666262
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032500107
oclc_num 1232516291
open_access_boolean
owner DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-573
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-384
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (x, 259 Seiten) 87 Illustrationen, 37 in Farbe
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2020
ZDB-2-LNC_2020
ZDB-2-LNC ZDB-2-LNC_2020
publishDate 2020
publishDateSearch 2020
publishDateSort 2020
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings
Lecture notes in computer science
Systems and Data Security
Computer Systems Organization and Communication Networks
Security Services
Information Systems and Communication Service
Coding and Information Theory
Computer security
Computer organization
Computers
Coding theory
Information theory
Informationstheorie (DE-588)4026927-9 gnd
Codierungstheorie (DE-588)4139405-7 gnd
Anonymisierung (DE-588)4139362-4 gnd
Kryptologie (DE-588)4033329-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Datensatz (DE-588)4011133-7 gnd
Privatsphäre (DE-588)4123980-5 gnd
Wissensextraktion (DE-588)4546354-2 gnd
subject_GND (DE-588)4026927-9
(DE-588)4139405-7
(DE-588)4139362-4
(DE-588)4033329-2
(DE-588)4011144-1
(DE-588)4011133-7
(DE-588)4123980-5
(DE-588)4546354-2
(DE-588)1071861417
title Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings
title_auth Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings
title_exact_search Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings
title_full Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings Lejla Batina, Stjepan Picek, Mainack Mondal (eds.)
title_fullStr Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings Lejla Batina, Stjepan Picek, Mainack Mondal (eds.)
title_full_unstemmed Security, privacy, and applied cryptography engineering 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings Lejla Batina, Stjepan Picek, Mainack Mondal (eds.)
title_short Security, privacy, and applied cryptography engineering
title_sort security privacy and applied cryptography engineering 10th international conference space 2020 kolkata india december 17 21 2020 proceedings
title_sub 10th international conference, SPACE 2020, Kolkata, India, December 17–21, 2020, proceedings
topic Systems and Data Security
Computer Systems Organization and Communication Networks
Security Services
Information Systems and Communication Service
Coding and Information Theory
Computer security
Computer organization
Computers
Coding theory
Information theory
Informationstheorie (DE-588)4026927-9 gnd
Codierungstheorie (DE-588)4139405-7 gnd
Anonymisierung (DE-588)4139362-4 gnd
Kryptologie (DE-588)4033329-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Datensatz (DE-588)4011133-7 gnd
Privatsphäre (DE-588)4123980-5 gnd
Wissensextraktion (DE-588)4546354-2 gnd
topic_facet Systems and Data Security
Computer Systems Organization and Communication Networks
Security Services
Information Systems and Communication Service
Coding and Information Theory
Computer security
Computer organization
Computers
Coding theory
Information theory
Informationstheorie
Codierungstheorie
Anonymisierung
Kryptologie
Datensicherung
Datensatz
Privatsphäre
Wissensextraktion
Konferenzschrift 2020 Online
url https://doi.org/10.1007/978-3-030-66626-2
volume_link (DE-604)BV014880109
work_keys_str_mv AT internationalconferenceonsecurityprivacyandappliedcryptographyengineeringonline securityprivacyandappliedcryptographyengineering10thinternationalconferencespace2020kolkataindiadecember17212020proceedings
AT batinalejla securityprivacyandappliedcryptographyengineering10thinternationalconferencespace2020kolkataindiadecember17212020proceedings
AT picekstjepan securityprivacyandappliedcryptographyengineering10thinternationalconferencespace2020kolkataindiadecember17212020proceedings
AT mondalmainack securityprivacyandappliedcryptographyengineering10thinternationalconferencespace2020kolkataindiadecember17212020proceedings