Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: CANS Dubai (VerfasserIn)
Weitere Verfasser: Beresford, Alastair R. (HerausgeberIn), Patra, Arpita (HerausgeberIn), Bellini, Emanuele (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2022]
Schriftenreihe:Lecture notes in computer science 13641
Schlagworte:
Online-Zugang:BTU01
FHA01
FHD01
FHI01
FHM01
FHN01
FHR01
FKE01
FLA01
FRO01
FWS01
FWS02
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UEI01
UER01
UPA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV048637691
003 DE-604
005 20230116
006 a |||| 10|||
007 cr|uuu---uuuuu
008 230110s2022 |||| o||u| ||||||eng d
020 |a 9783031209741  |c Online  |9 978-3-031-20974-1 
024 7 |a 10.1007/978-3-031-20974-1  |2 doi 
035 |a (ZDB-2-SCS)9783031209741 
035 |a (ZDB-2-LNC)9783031209741 
035 |a (OCoLC)1357529274 
035 |a (DE-599)BVBBV048637691 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-824  |a DE-384  |a DE-M347  |a DE-573  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.824  |2 23 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 461  |2 stub 
084 |a DAT 465  |2 stub 
111 2 |a CANS  |n 21.  |d 2022  |c Dubai  |j Verfasser  |0 (DE-588)1274838169  |4 aut 
245 1 0 |a Cryptology and network security  |b 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings  |c Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2022] 
300 |a 1 Online-Ressource (xiii, 391 Seiten)  |b 70 Illustrationen, 17 in Farbe 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 13641  |x 1611-3349 
650 4 |a Cryptology 
650 4 |a Computer Engineering and Networks 
650 4 |a Mobile and Network Security 
650 4 |a Data and Information Security 
650 4 |a Computer Engineering and Networks 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer engineering 
650 4 |a Computer networks  
650 4 |a Computer networks—Security measures 
650 4 |a Data protection 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Anwendungssoftware  |0 (DE-588)4120906-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Software Engineering  |0 (DE-588)4116521-4  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2022  |z Dubai  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 4 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 0 5 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 1 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 2 |a Anwendungssoftware  |0 (DE-588)4120906-0  |D s 
689 1 3 |a Software Engineering  |0 (DE-588)4116521-4  |D s 
689 1 |5 DE-604 
700 1 |a Beresford, Alastair R.  |4 edt 
700 1 |a Patra, Arpita  |4 edt 
700 1 |a Bellini, Emanuele  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-20973-4 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-20975-8 
830 0 |a Lecture notes in computer science  |v 13641  |w (DE-604)BV014880109  |9 13641 
856 4 0 |u https://doi.org/10.1007/978-3-031-20974-1  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2022 
940 1 |q ZDB-2-LNC_2022 
999 |a oai:aleph.bib-bvb.de:BVB01-034012656 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l BTU01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FHD01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FHI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FLA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FWS01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l FWS02  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l HTW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2022  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UBY01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UEI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-20974-1  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 1024473
DE-BY-TUM_katkey 2708544
DE-BY-TUM_local_url Verlag
https://doi.org/10.1007/978-3-031-20974-1
DE-BY-UBG_katkey 196956718
DE-BY-UBG_local_url Verlag
https://doi.org/10.1007/978-3-031-20974-1
_version_ 1816714884197384192
adam_txt
any_adam_object
any_adam_object_boolean
author2 Beresford, Alastair R.
Patra, Arpita
Bellini, Emanuele
author2_role edt
edt
edt
author2_variant a r b ar arb
a p ap
e b eb
author_corporate CANS Dubai
author_corporate_role aut
author_facet Beresford, Alastair R.
Patra, Arpita
Bellini, Emanuele
CANS Dubai
author_sort CANS Dubai
building Verbundindex
bvnumber BV048637691
classification_rvk SS 4800
classification_tum DAT 461
DAT 465
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783031209741
(ZDB-2-LNC)9783031209741
(OCoLC)1357529274
(DE-599)BVBBV048637691
dewey-full 005.824
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.824
dewey-search 005.824
dewey-sort 15.824
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/978-3-031-20974-1
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06052nmm a2201165zcb4500</leader><controlfield tag="001">BV048637691</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230116 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230110s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031209741</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-20974-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-20974-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031209741</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783031209741</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1357529274</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048637691</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">21.</subfield><subfield code="d">2022</subfield><subfield code="c">Dubai</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1274838169</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings</subfield><subfield code="c">Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 391 Seiten)</subfield><subfield code="b">70 Illustrationen, 17 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13641</subfield><subfield code="x">1611-3349</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Dubai</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Beresford, Alastair R.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patra, Arpita</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bellini, Emanuele</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-20973-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-20975-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13641</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">13641</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2022</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2022</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034012656</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UEI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-20974-1</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2022 Dubai gnd-content
genre_facet Konferenzschrift 2022 Dubai
id DE-604.BV048637691
illustrated Not Illustrated
index_date 2024-09-19T15:57:26Z
indexdate 2024-11-25T18:02:39Z
institution BVB
institution_GND (DE-588)1274838169
isbn 9783031209741
issn 1611-3349
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-034012656
oclc_num 1357529274
open_access_boolean
owner DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
owner_facet DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xiii, 391 Seiten) 70 Illustrationen, 17 in Farbe
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2022
ZDB-2-LNC_2022
ZDB-2-LNC ZDB-2-LNC_2022
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings
Lecture notes in computer science
Cryptology
Computer Engineering and Networks
Mobile and Network Security
Data and Information Security
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks 
Computer networks—Security measures
Data protection
Kryptosystem (DE-588)4209132-9 gnd
Anwendungssoftware (DE-588)4120906-0 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptologie (DE-588)4033329-2 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Software Engineering (DE-588)4116521-4 gnd
subject_GND (DE-588)4209132-9
(DE-588)4120906-0
(DE-588)4011144-1
(DE-588)4033329-2
(DE-588)4830502-9
(DE-588)4709127-7
(DE-588)4274324-2
(DE-588)4070085-9
(DE-588)4116521-4
(DE-588)1071861417
title Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings
title_auth Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings
title_exact_search Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings
title_exact_search_txtP Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings
title_full Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.)
title_fullStr Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.)
title_full_unstemmed Cryptology and network security 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.)
title_short Cryptology and network security
title_sort cryptology and network security 21st international conference cans 2022 abu dhabi united arab emirates november 13 16 2022 proceedings
title_sub 21st international conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, proceedings
topic Cryptology
Computer Engineering and Networks
Mobile and Network Security
Data and Information Security
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks 
Computer networks—Security measures
Data protection
Kryptosystem (DE-588)4209132-9 gnd
Anwendungssoftware (DE-588)4120906-0 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptologie (DE-588)4033329-2 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Software Engineering (DE-588)4116521-4 gnd
topic_facet Cryptology
Computer Engineering and Networks
Mobile and Network Security
Data and Information Security
Cryptography
Data encryption (Computer science)
Computer engineering
Computer networks 
Computer networks—Security measures
Data protection
Kryptosystem
Anwendungssoftware
Datensicherung
Kryptologie
Kryptoanalyse
Sicherheitsprotokoll
Computersicherheit
Rechnernetz
Software Engineering
Konferenzschrift 2022 Dubai
url https://doi.org/10.1007/978-3-031-20974-1
volume_link (DE-604)BV014880109
work_keys_str_mv AT cansdubai cryptologyandnetworksecurity21stinternationalconferencecans2022abudhabiunitedarabemiratesnovember13162022proceedings
AT beresfordalastairr cryptologyandnetworksecurity21stinternationalconferencecans2022abudhabiunitedarabemiratesnovember13162022proceedings
AT patraarpita cryptologyandnetworksecurity21stinternationalconferencecans2022abudhabiunitedarabemiratesnovember13162022proceedings
AT belliniemanuele cryptologyandnetworksecurity21stinternationalconferencecans2022abudhabiunitedarabemiratesnovember13162022proceedings