Skip to content
TUM Library
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporarily saved: 0 temporarily saved (Full)
  • Help
    • Contact
    • Search Tips
    • Interlibary loan info
  • Chat
  • Tools
    • Search History
    • Open Interlibary Loan
    • Recommend a Purchase
  • Deutsch
  • Account

    Account

    • Borrowed Items
    • Requested Items
    • Fees
    • Profile
    • Search History
  • Log Out
  • Login
  • Books & Journals
  • Papers
Advanced
  • Computer Security -- ESORICS 2...
  • Cite this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
    • Export to BibTeX
    • Export to RIS
  • Add to favorites
  • Save temporarily Remove from Book Bag
  • Permalink
Export Ready — 
Cover Image
Saved in:
Bibliographic Details
Other Authors: Pernul, Günther 1961- (Editor)
Format: Electronic Conference Proceedings eBook
Language:English
Published: Cham Springer International Publishing [2015]
Edition:1st ed.
Series:Lecture Notes in Computer Science 9327
Subjects:
Computer science
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Informatik
Computersicherheit
Datensicherung
Rechnernetz
Kryptoanalyse
Zugriffskontrolle
Kryptologie
Privatsphäre
Konferenzschrift
Links:https://doi.org/10.1007/978-3-319-24177-7
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
Physical Description:XVII, 665 Seiten Illustrationen
ISBN:9783319241777
9783319241760
ISSN:0302-9743
DOI:10.1007/978-3-319-24177-7
Staff View

MARC

LEADER 00000nam a2200000zcb4500
001 BV043209460
003 DE-604
005 20200514
007 cr|uuu---uuuuu
008 151215s2015 xx a||| o|||| 10||| eng d
020 |a 9783319241777  |c Online  |9 978-3-319-24177-7 
020 |a 9783319241760  |c Print  |9 978-3-319-24176-0 
024 7 |a 10.1007/978-3-319-24177-7  |2 doi 
035 |a (OCoLC)930000032 
035 |a (DE-599)BVBBV043209460 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-91  |a DE-19  |a DE-384  |a DE-Aug4  |a DE-M347  |a DE-573  |a DE-859  |a DE-703  |a DE-473  |a DE-29  |a DE-706  |a DE-20  |a DE-739  |a DE-92  |a DE-634  |a DE-860  |a DE-861  |a DE-355 
082 0 |a 005.8  |2 23 
084 |a DAT 050f  |2 stub 
084 |a DAT 460f  |2 stub 
084 |a DAT 000  |2 stub 
084 |a DAT 461f  |2 stub 
084 |a DAT 465f  |2 stub 
245 1 0 |a Computer Security -- ESORICS 2015  |b 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II  |c edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl 
250 |a 1st ed. 
264 1 |a Cham  |b Springer International Publishing  |c [2015] 
264 4 |c © 2015 
300 |a XVII, 665 Seiten  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 9327  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Algorithms 
650 4 |a Computers and civilization 
650 4 |a Management information systems 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Data Encryption 
650 4 |a Management of Computing and Information Systems 
650 4 |a Algorithm Analysis and Problem Complexity 
650 4 |a Computers and Society 
650 4 |a Informatik 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 3 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 |5 DE-604 
689 1 0 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 1 1 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 1 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 1 |5 DE-604 
700 1 |a Pernul, Günther  |d 1961-  |0 (DE-588)1063138930  |4 edt 
711 2 |a ESORICS  |n 20.  |d 2015  |c Wien  |j Sonstige  |0 (DE-588)1076610501  |4 oth 
830 0 |a Lecture Notes in Computer Science  |v 9327  |w (DE-604)BV014880109  |9 9327 
856 4 0 |u https://doi.org/10.1007/978-3-319-24177-7  |x Verlag  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2015 
940 1 |q ZDB-2-LNC_2015 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028632621 

Record in the Search Index

DE-BY-TUM_katkey 2159951
DE-BY-UBR_katkey 6739855
_version_ 1835098051144843264
adam_text COMPUTER SECURITY -- ESORICS 2015 / : 2015 ABSTRACT / INHALTSTEXT THE TWO-VOLUME SET, LNCS 9326 AND LNCS 9327 CONSTITUTES THE REFEREED PROCEEDINGS OF THE 20TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY, ESORICS 2015, HELD IN VIENNA, AUSTRIA, IN SEPTEMBER 2015. THE 59 REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 298 SUBMISSIONS. THE PAPERS ADDRESS ISSUES SUCH AS NETWORKS AND WEB SECURITY; SYSTEM SECURITY; CRYPTO APPLICATION AND ATTACKS; RISK ANALYSIS; PRIVACY; CLOUD SECURITY; PROTOCOLS AND ATTRIBUTE-BASED ENCRYPTION; CODE ANALYSIS AND SIDE-CHANNELS; DETECTION AND MONITORING; AUTHENTICATION; POLICIES; AND APPLIED SECURITY DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author2 Pernul, Günther 1961-
author2_role edt
author2_variant g p gp
author_GND (DE-588)1063138930
author_facet Pernul, Günther 1961-
building Verbundindex
bvnumber BV043209460
classification_tum DAT 050f
DAT 460f
DAT 000
DAT 461f
DAT 465f
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (OCoLC)930000032
(DE-599)BVBBV043209460
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-24177-7
edition 1st ed.
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03524nam a2200841zcb4500</leader><controlfield tag="001">BV043209460</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200514 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319241777</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-24177-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319241760</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-24176-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-24177-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)930000032</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209460</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Security -- ESORICS 2015</subfield><subfield code="b">20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II</subfield><subfield code="c">edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 665 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9327</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pernul, Günther</subfield><subfield code="d">1961-</subfield><subfield code="0">(DE-588)1063138930</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">20.</subfield><subfield code="d">2015</subfield><subfield code="c">Wien</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1076610501</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9327</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9327</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-24177-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=028632621&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632621</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV043209460
illustrated Illustrated
indexdate 2024-12-20T17:31:12Z
institution BVB
institution_GND (DE-588)1076610501
isbn 9783319241777
9783319241760
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028632621
oclc_num 930000032
open_access_boolean
owner DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-384
DE-Aug4
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-706
DE-20
DE-739
DE-92
DE-634
DE-860
DE-861
DE-355
DE-BY-UBR
owner_facet DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-384
DE-Aug4
DE-M347
DE-573
DE-859
DE-703
DE-473
DE-BY-UBG
DE-29
DE-706
DE-20
DE-739
DE-92
DE-634
DE-860
DE-861
DE-355
DE-BY-UBR
physical XVII, 665 Seiten Illustrationen
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2015
ZDB-2-LNC_2015
publishDate 2015
publishDateSearch 2015
publishDateSort 2015
publisher Springer International Publishing
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
Lecture Notes in Computer Science
Computer science
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Informatik
Computersicherheit (DE-588)4274324-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptologie (DE-588)4033329-2 gnd
Privatsphäre (DE-588)4123980-5 gnd
subject_GND (DE-588)4274324-2
(DE-588)4011144-1
(DE-588)4070085-9
(DE-588)4830502-9
(DE-588)4293034-0
(DE-588)4033329-2
(DE-588)4123980-5
(DE-588)1071861417
title Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
title_auth Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
title_exact_search Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
title_full Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
title_fullStr Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
title_full_unstemmed Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II edited by Günther Pernul, Peter Y A Ryan, Edgar Weippl
title_short Computer Security -- ESORICS 2015
title_sort computer security esorics 2015 20th european symposium on research in computer security vienna austria september 21 25 2015 proceedings part ii
title_sub 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
topic Computer science
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Informatik
Computersicherheit (DE-588)4274324-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptologie (DE-588)4033329-2 gnd
Privatsphäre (DE-588)4123980-5 gnd
topic_facet Computer science
Computer security
Data encryption (Computer science)
Algorithms
Computers and civilization
Management information systems
Computer Science
Systems and Data Security
Data Encryption
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Informatik
Computersicherheit
Datensicherung
Rechnernetz
Kryptoanalyse
Zugriffskontrolle
Kryptologie
Privatsphäre
Konferenzschrift
url https://doi.org/10.1007/978-3-319-24177-7
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632621&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV014880109
work_keys_str_mv AT pernulgunther computersecurityesorics201520theuropeansymposiumonresearchincomputersecurityviennaaustriaseptember21252015proceedingspartii
AT esoricswien computersecurityesorics201520theuropeansymposiumonresearchincomputersecurityviennaaustriaseptember21252015proceedingspartii
  • Availability
Order (Login required)
Read online
  • Legal Notice
  • Data Privacy
  • Accessibility Statement
  • First Level Hotline