ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Meyer, Norbert (HerausgeberIn), Grocholewska-Czuryło, Anna (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham Springer Nature Switzerland 2024
Cham Springer
Ausgabe:1st ed. 2024
Schriftenreihe:IFIP Advances in Information and Communication Technology 679
Schlagworte:
Online-Zugang:DE-522
DE-634
DE-Aug4
DE-1050
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-824
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV049673488
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 240503s2024 xx o|||| 00||| eng d
020 |a 9783031563263  |c Online  |9 978-3-031-56326-3 
024 7 |a 10.1007/978-3-031-56326-3  |2 doi 
035 |a (ZDB-2-SCS)9783031563263 
035 |a (OCoLC)1437859020 
035 |a (DE-599)BVBBV049673488 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-355  |a DE-824  |a DE-522  |a DE-384  |a DE-M347  |a DE-573  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 000  |2 stub 
245 1 0 |a ICT Systems Security and Privacy Protection  |b 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers  |c edited by Norbert Meyer, Anna Grocholewska-Czuryło 
250 |a 1st ed. 2024 
264 1 |a Cham  |b Springer Nature Switzerland  |c 2024 
264 1 |a Cham  |b Springer 
300 |a 1 Online-Ressource (XIII, 378 p. 100 illus., 79 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a IFIP Advances in Information and Communication Technology  |v 679  |x 1868-422X 
650 4 |a Data and Information Security 
650 4 |a Computer Engineering and Networks 
650 4 |a Computing Milieux 
650 4 |a Computer Communication Networks 
650 4 |a Cryptology 
650 4 |a Data protection 
650 4 |a Computer engineering 
650 4 |a Computer networks  
650 4 |a Computers 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
700 1 |a Meyer, Norbert  |4 edt 
700 1 |a Grocholewska-Czuryło, Anna  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-56325-6 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-56327-0 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-56328-7 
856 4 0 |u https://doi.org/10.1007/978-3-031-56326-3  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2024 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035016435 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-522  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-1050  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-573  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-898  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-860  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-861  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-863  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-862  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-523  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-91  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-384  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-824  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-56326-3  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2792217
DE-BY-UBM_katkey 6626097
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-031-56326-3
DE-BY-UBR_katkey 6985168
_version_ 1823049382630522880
any_adam_object
author2 Meyer, Norbert
Grocholewska-Czuryło, Anna
author2_role edt
edt
author2_variant n m nm
a g c agc
author_facet Meyer, Norbert
Grocholewska-Czuryło, Anna
building Verbundindex
bvnumber BV049673488
classification_tum DAT 000
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)9783031563263
(OCoLC)1437859020
(DE-599)BVBBV049673488
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-031-56326-3
edition 1st ed. 2024
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04620nam a2200853zcb4500</leader><controlfield tag="001">BV049673488</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240503s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031563263</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-56326-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-56326-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031563263</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1437859020</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049673488</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ICT Systems Security and Privacy Protection</subfield><subfield code="b">38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers</subfield><subfield code="c">edited by Norbert Meyer, Anna Grocholewska-Czuryło</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer Nature Switzerland</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 378 p. 100 illus., 79 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">679</subfield><subfield code="x">1868-422X</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meyer, Norbert</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grocholewska-Czuryło, Anna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-56325-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-56327-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-56328-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035016435</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-56326-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049673488
illustrated Not Illustrated
indexdate 2025-02-03T15:58:23Z
institution BVB
isbn 9783031563263
issn 1868-422X
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035016435
oclc_num 1437859020
open_access_boolean
owner DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-522
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
owner_facet DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-355
DE-BY-UBR
DE-824
DE-522
DE-384
DE-M347
DE-573
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (XIII, 378 p. 100 illus., 79 illus. in color)
psigel ZDB-2-SCS
ZDB-2-SCS_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Springer Nature Switzerland
Springer
record_format marc
series2 IFIP Advances in Information and Communication Technology
spellingShingle ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers
Data and Information Security
Computer Engineering and Networks
Computing Milieux
Computer Communication Networks
Cryptology
Data protection
Computer engineering
Computer networks 
Computers
Cryptography
Data encryption (Computer science)
title ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers
title_auth ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers
title_exact_search ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers
title_full ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers edited by Norbert Meyer, Anna Grocholewska-Czuryło
title_fullStr ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers edited by Norbert Meyer, Anna Grocholewska-Czuryło
title_full_unstemmed ICT Systems Security and Privacy Protection 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers edited by Norbert Meyer, Anna Grocholewska-Czuryło
title_short ICT Systems Security and Privacy Protection
title_sort ict systems security and privacy protection 38th ifip tc 11 international conference sec 2023 poznan poland june 14 16 2023 revised selected papers
title_sub 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers
topic Data and Information Security
Computer Engineering and Networks
Computing Milieux
Computer Communication Networks
Cryptology
Data protection
Computer engineering
Computer networks 
Computers
Cryptography
Data encryption (Computer science)
topic_facet Data and Information Security
Computer Engineering and Networks
Computing Milieux
Computer Communication Networks
Cryptology
Data protection
Computer engineering
Computer networks 
Computers
Cryptography
Data encryption (Computer science)
url https://doi.org/10.1007/978-3-031-56326-3
work_keys_str_mv AT meyernorbert ictsystemssecurityandprivacyprotection38thifiptc11internationalconferencesec2023poznanpolandjune14162023revisedselectedpapers
AT grocholewskaczuryłoanna ictsystemssecurityandprivacyprotection38thifiptc11internationalconferencesec2023poznanpolandjune14162023revisedselectedpapers