Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cham
Springer International Publishing
[2015]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | Lecture Notes in Computer Science
9327 |
Schlagwörter: | |
Links: | https://doi.org/10.1007/978-3-319-24177-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XVII, 665 Seiten Illustrationen |
ISBN: | 9783319241777 9783319241760 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-24177-7 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209460 | ||
003 | DE-604 | ||
005 | 20200514 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319241777 |c Online |9 978-3-319-24177-7 | ||
020 | |a 9783319241760 |c Print |9 978-3-319-24176-0 | ||
024 | 7 | |a 10.1007/978-3-319-24177-7 |2 doi | |
035 | |a (OCoLC)930000032 | ||
035 | |a (DE-599)BVBBV043209460 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Computer Security -- ESORICS 2015 |b 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II |c edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl |
250 | |a 1st ed. | ||
264 | 1 | |a Cham |b Springer International Publishing |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a XVII, 665 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9327 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Pernul, Günther |d 1961- |0 (DE-588)1063138930 |4 edt | |
711 | 2 | |a ESORICS |n 20. |d 2015 |c Wien |j Sonstige |0 (DE-588)1076610501 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9327 |w (DE-604)BV014880109 |9 9327 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-24177-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028632621 |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2159951 |
---|---|
_version_ | 1821932394692739073 |
adam_text | COMPUTER SECURITY -- ESORICS 2015
/
: 2015
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME SET, LNCS 9326 AND LNCS 9327 CONSTITUTES THE REFEREED
PROCEEDINGS OF THE 20TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER
SECURITY, ESORICS 2015, HELD IN VIENNA, AUSTRIA, IN SEPTEMBER 2015. THE
59 REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED
FROM 298 SUBMISSIONS. THE PAPERS ADDRESS ISSUES SUCH AS NETWORKS AND WEB
SECURITY; SYSTEM SECURITY; CRYPTO APPLICATION AND ATTACKS; RISK
ANALYSIS; PRIVACY; CLOUD SECURITY; PROTOCOLS AND ATTRIBUTE-BASED
ENCRYPTION; CODE ANALYSIS AND SIDE-CHANNELS; DETECTION AND MONITORING;
AUTHENTICATION; POLICIES; AND APPLIED SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Pernul, Günther 1961- |
author2_role | edt |
author2_variant | g p gp |
author_GND | (DE-588)1063138930 |
author_facet | Pernul, Günther 1961- |
building | Verbundindex |
bvnumber | BV043209460 |
classification_tum | DAT 050f DAT 460f DAT 000 DAT 461f DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)930000032 (DE-599)BVBBV043209460 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-24177-7 |
edition | 1st ed. |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03524nam a2200841zcb4500</leader><controlfield tag="001">BV043209460</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319241777</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-24177-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319241760</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-24176-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-24177-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930000032</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209460</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Security -- ESORICS 2015</subfield><subfield code="b">20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II</subfield><subfield code="c">edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 665 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9327</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pernul, Günther</subfield><subfield code="d">1961-</subfield><subfield code="0">(DE-588)1063138930</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">20.</subfield><subfield code="d">2015</subfield><subfield code="c">Wien</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1076610501</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9327</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9327</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-24177-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632621</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043209460 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:31:12Z |
institution | BVB |
institution_GND | (DE-588)1076610501 |
isbn | 9783319241777 9783319241760 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632621 |
oclc_num | 930000032 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | XVII, 665 Seiten Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II Lecture Notes in Computer Science Computer science Computer security Data encryption (Computer science) Algorithms Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Informatik Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Kryptologie (DE-588)4033329-2 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4293034-0 (DE-588)4033329-2 (DE-588)4123980-5 (DE-588)1071861417 |
title | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II |
title_auth | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II |
title_exact_search | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II |
title_full | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl |
title_fullStr | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl |
title_full_unstemmed | Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl |
title_short | Computer Security -- ESORICS 2015 |
title_sort | computer security esorics 2015 20th european symposium on research in computer security vienna austria september 21 25 2015 proceedings part ii |
title_sub | 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II |
topic | Computer science Computer security Data encryption (Computer science) Algorithms Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Informatik Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Kryptologie (DE-588)4033329-2 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Informatik Computersicherheit Datensicherung Rechnernetz Kryptoanalyse Zugriffskontrolle Kryptologie Privatsphäre Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-24177-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT pernulgunther computersecurityesorics201520theuropeansymposiumonresearchincomputersecurityviennaaustriaseptember21252015proceedingspartii AT esoricswien computersecurityesorics201520theuropeansymposiumonresearchincomputersecurityviennaaustriaseptember21252015proceedingspartii |