Secure IT systems: 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8208 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 320S.) graph. Darst. |
ISBN: | 3642414877 9783642414886 |
DOI: | 10.1007/978-3-642-41488-6 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041590409 | ||
003 | DE-604 | ||
005 | 20140224 | ||
007 | cr|uuu---uuuuu | ||
008 | 140127s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 3642414877 |9 3-642-41487-7 | ||
020 | |a 9783642414886 |c eISBN |9 978-3-642-41488-6 | ||
024 | 7 | |a 10.1007/978-3-642-41488-6 |2 doi | |
024 | 3 | |a 9783642414879 | |
028 | 5 | 2 | |a Best.-Nr.: 86327677 |
035 | |a (OCoLC)874395516 | ||
035 | |a (DE-599)BVBBV041590409 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Secure IT systems |b 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |c Hanne Riis Nielson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIII, 320S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8208 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Ilulissat |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 5 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 6 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 4 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Nielson, Hanne Riis |d 1954- |e Sonstige |0 (DE-588)120458241 |4 oth | |
711 | 2 | |a NordSec |n 18 |d 2013 |c Ilulissat |j Sonstige |0 (DE-588)1044267100 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-41487-9 |
830 | 0 | |a Lecture notes in computer science |v 8208 |w (DE-604)BV014880109 |9 8208 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-41488-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027035482 |
Datensatz im Suchindex
_version_ | 1820875557996331008 |
---|---|
adam_text |
SECURE IT SYSTEMS
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CYBER-PHYSICAL SYSTEMS
SECURITY POLICIES
INFORMATION FLOW
SECURITY EXPERIENCES
CYBER-PHYSICAL SYSTEMS
WEB SECURITY
SECURITY POLICIES
NETWORK SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURE IT SYSTEMS
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 18TH NORDIC
CONFERENCE ON SECURE IT SYSTEMS, NORDSEC 2013, HELD IN ILULISSAT,
GREENLAND, IN OCTOBER 2013. THE 18 REVISED REGULAR PAPERS TOGETHER WITH
3 SHORT PAPERS AND ONE INVITED TALK WERE CAREFULLY REVIEWED AND SELECTED
FROM 35 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON
FORMAL ANALYSIS OF SECURITY PROTOCOLS, CYBER-PHYSICAL SYSTEMS, SECURITY
POLICIES, INFORMATION FLOW, SECURITY EXPERIENCES, WEB SECURITY, AND
NETWORK SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)120458241 |
building | Verbundindex |
bvnumber | BV041590409 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 000 DAT 050f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)874395516 (DE-599)BVBBV041590409 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-41488-6 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041590409</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140224</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140127s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642414877</subfield><subfield code="9">3-642-41487-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642414886</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-41488-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-41488-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642414879</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86327677</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874395516</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041590409</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure IT systems</subfield><subfield code="b">18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings</subfield><subfield code="c">Hanne Riis Nielson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 320S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8208</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Ilulissat</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nielson, Hanne Riis</subfield><subfield code="d">1954-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)120458241</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">NordSec</subfield><subfield code="n">18</subfield><subfield code="d">2013</subfield><subfield code="c">Ilulissat</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1044267100</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-41487-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8208</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8208</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-41488-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027035482</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Ilulissat gnd-content |
genre_facet | Konferenzschrift 2013 Ilulissat |
id | DE-604.BV041590409 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:31Z |
institution | BVB |
institution_GND | (DE-588)1044267100 |
isbn | 3642414877 9783642414886 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027035482 |
oclc_num | 874395516 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 320S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XIII, 320S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8208 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kritische Infrastruktur (DE-588)7636249-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Ilulissat gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Privatsphäre (DE-588)4123980-5 s World Wide Web (DE-588)4363898-3 s Mobile Computing (DE-588)4694120-4 s Kritische Informationsinfrastruktur (DE-588)7636254-1 s DE-604 Kritische Infrastruktur (DE-588)7636249-8 s 1\p DE-604 Nielson, Hanne Riis 1954- Sonstige (DE-588)120458241 oth NordSec 18 2013 Ilulissat Sonstige (DE-588)1044267100 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-41487-9 Lecture notes in computer science 8208 (DE-604)BV014880109 8208 https://doi.org/10.1007/978-3-642-41488-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Mobile Computing (DE-588)4694120-4 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4694120-4 (DE-588)4363898-3 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4123980-5 (DE-588)7636249-8 (DE-588)1071861417 |
title | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
title_auth | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
title_exact_search | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
title_full | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) |
title_fullStr | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) |
title_full_unstemmed | Secure IT systems 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings Hanne Riis Nielson ... (eds.) |
title_short | Secure IT systems |
title_sort | secure it systems 18th nordic conference nordsec 2013 ilulissat greenland october 18 21 2013 proceedings |
title_sub | 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18 - 21, 2013 ; proceedings |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Mobile Computing (DE-588)4694120-4 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd |
topic_facet | Kritische Informationsinfrastruktur Mobile Computing World Wide Web Kryptoanalyse Computersicherheit Datensicherung Privatsphäre Kritische Infrastruktur Konferenzschrift 2013 Ilulissat |
url | https://doi.org/10.1007/978-3-642-41488-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035482&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT nielsonhanneriis secureitsystems18thnordicconferencenordsec2013ilulissatgreenlandoctober18212013proceedings AT nordsecilulissat secureitsystems18thnordicconferencenordsec2013ilulissatgreenlandoctober18212013proceedings |