Skip to content
TUM Library
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporarily saved: 0 temporarily saved (Full)
  • Help
    • Contact
    • Search Tips
    • Interlibary loan info
  • Chat
  • Tools
    • Search History
    • Open Interlibary Loan
    • Recommend a Purchase
  • Deutsch
  • Account

    Account

    • Borrowed Items
    • Requested Items
    • Fees
    • Profile
    • Search History
  • Log Out
  • Login
  • Books & Journals
  • Papers
Advanced
  • Computer Security – ESORICS 20...
  • Cite this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
    • Export to BibTeX
    • Export to RIS
  • Add to favorites
  • Save temporarily Remove from Book Bag
  • Permalink
Export Ready — 
Cover Image
Saved in:
Bibliographic Details
Other Authors: Pernul, Günther 1961- (Editor)
Format: Electronic Conference Proceedings eBook
Language:English
Published: Cham Springer International Publishing [2015]
Series:Lecture Notes in Computer Science 9326
Subjects:
Computer science
Computer Science
Computer Science, general
Informatik
Zugriffskontrolle
Kryptoanalyse
Privatsphäre
Kryptologie
Computersicherheit
Rechnernetz
Datensicherung
Konferenzschrift
Links:https://doi.org/10.1007/978-3-319-24174-6
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Physical Description:XVIII, 543 Seiten Illustrationen
ISBN:9783319241746
9783319241739
ISSN:0302-9743
DOI:10.1007/978-3-319-24174-6
Staff View

MARC

LEADER 00000nam a2200000zcb4500
001 BV043209457
003 DE-604
005 20200514
007 cr|uuu---uuuuu
008 151215s2015 xx a||| o|||| 10||| eng d
020 |a 9783319241746  |c Online  |9 978-3-319-24174-6 
020 |a 9783319241739  |c Print  |9 978-3-319-24173-9 
024 7 |a 10.1007/978-3-319-24174-6  |2 doi 
035 |a (OCoLC)930000018 
035 |a (DE-599)BVBBV043209457 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91  |a DE-19  |a DE-384  |a DE-Aug4  |a DE-M347  |a DE-573  |a DE-859  |a DE-703  |a DE-473  |a DE-29  |a DE-706  |a DE-20  |a DE-739  |a DE-92  |a DE-634  |a DE-860  |a DE-861  |a DE-355 
082 0 |a 004  |2 23 
084 |a DAT 460f  |2 stub 
084 |a DAT 465f  |2 stub 
084 |a DAT 050f  |2 stub 
084 |a DAT 000  |2 stub 
084 |a DAT 461f  |2 stub 
245 1 0 |a Computer Security – ESORICS 2015  |b 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I  |c edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl 
264 1 |a Cham  |b Springer International Publishing  |c [2015] 
264 4 |c © 2015 
300 |a XVIII, 543 Seiten  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 9326  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Computer Science 
650 4 |a Computer Science, general 
650 4 |a Informatik 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 |5 DE-604 
689 1 0 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 1 1 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 1 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 1 |5 DE-604 
700 1 |a Pernul, Günther  |d 1961-  |0 (DE-588)1063138930  |4 edt 
711 2 |a ESORICS  |n 20.  |d 2015  |c Wien  |j Sonstige  |0 (DE-588)1076610501  |4 oth 
830 0 |a Lecture Notes in Computer Science  |v 9326  |w (DE-604)BV014880109  |9 9326 
856 4 0 |u https://doi.org/10.1007/978-3-319-24174-6  |x Verlag  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2015 
940 1 |q ZDB-2-LNC_2015 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028632618 

Record in the Search Index

DE-BY-TUM_katkey 2159948
DE-BY-UBR_katkey 6739854
_version_ 1835104492792578048
any_adam_object 1
author2 Pernul, Günther 1961-
author2_role edt
author2_variant g p gp
author_GND (DE-588)1063138930
author_facet Pernul, Günther 1961-
building Verbundindex
bvnumber BV043209457
classification_tum DAT 460f
DAT 465f
DAT 050f
DAT 000
DAT 461f
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (OCoLC)930000018
(DE-599)BVBBV043209457
dewey-full 004
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004
dewey-search 004
dewey-sort 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-24174-6
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03107nam a2200721zcb4500</leader><controlfield tag="001">BV043209457</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319241746</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-24174-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319241739</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-24173-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-24174-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930000018</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209457</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Security – ESORICS 2015</subfield><subfield code="b">20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I</subfield><subfield code="c">edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 543 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9326</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pernul, Günther</subfield><subfield code="d">1961-</subfield><subfield code="0">(DE-588)1063138930</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">20.</subfield><subfield code="d">2015</subfield><subfield code="c">Wien</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1076610501</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9326</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9326</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-24174-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028632618&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632618</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV043209457
illustrated Illustrated
indexdate 2024-12-20T17:31:12Z
institution BVB
institution_GND (DE-588)1076610501
isbn 9783319241746
9783319241739
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028632618
oclc_num 930000018
open_access_boolean
owner DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-384
DE-Aug4
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-706
DE-20
DE-739
DE-92
DE-634
DE-860
DE-861
DE-355
DE-BY-UBR
owner_facet DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-384
DE-Aug4
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-706
DE-20
DE-739
DE-92
DE-634
DE-860
DE-861
DE-355
DE-BY-UBR
physical XVIII, 543 Seiten Illustrationen
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2015
ZDB-2-LNC_2015
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Springer International Publishing
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I
Lecture Notes in Computer Science
Computer science
Computer Science
Computer Science, general
Informatik
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Privatsphäre (DE-588)4123980-5 gnd
Kryptologie (DE-588)4033329-2 gnd
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Datensicherung (DE-588)4011144-1 gnd
subject_GND (DE-588)4293034-0
(DE-588)4830502-9
(DE-588)4123980-5
(DE-588)4033329-2
(DE-588)4274324-2
(DE-588)4070085-9
(DE-588)4011144-1
(DE-588)1071861417
title Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I
title_auth Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I
title_exact_search Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I
title_full Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
title_fullStr Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
title_full_unstemmed Computer Security – ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
title_short Computer Security – ESORICS 2015
title_sort computer security esorics 2015 20th european symposium on research in computer security vienna austria september 21 25 2015 proceedings part i
title_sub 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21–25, 2015, Proceedings, Part I
topic Computer science
Computer Science
Computer Science, general
Informatik
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Privatsphäre (DE-588)4123980-5 gnd
Kryptologie (DE-588)4033329-2 gnd
Computersicherheit (DE-588)4274324-2 gnd
Rechnernetz (DE-588)4070085-9 gnd
Datensicherung (DE-588)4011144-1 gnd
topic_facet Computer science
Computer Science
Computer Science, general
Informatik
Zugriffskontrolle
Kryptoanalyse
Privatsphäre
Kryptologie
Computersicherheit
Rechnernetz
Datensicherung
Konferenzschrift
url https://doi.org/10.1007/978-3-319-24174-6
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632618&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV014880109
work_keys_str_mv AT pernulgunther computersecurityesorics201520theuropeansymposiumonresearchincomputersecurityviennaaustriaseptember21252015proceedingsparti
AT esoricswien computersecurityesorics201520theuropeansymposiumonresearchincomputersecurityviennaaustriaseptember21252015proceedingsparti
  • Availability
Order (Login required)
Read online
  • Legal Notice
  • Data Privacy
  • Accessibility Statement
  • First Level Hotline