Computer security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings 1
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8712 |
Schlagworte: | |
Online-Zugang: | BTU01 FHM01 FHN01 FKE01 FRO01 TUM01 UBA01 UBG01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XV, 545 S.) graph. Darst. |
ISBN: | 9783319112022 9783319112039 |
DOI: | 10.1007/978-3-319-11203-9 |
Internformat
MARC
LEADER | 00000nmm a2200000 cc4500 | ||
---|---|---|---|
001 | BV042178515 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 141111s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319112022 |9 978-3-319-11202-2 | ||
020 | |a 9783319112039 |c eISBN |9 978-3-319-11203-9 | ||
024 | 7 | |a 10.1007/978-3-319-11203-9 |2 doi | |
035 | |a (OCoLC)897158422 | ||
035 | |a (DE-599)BVBBV042178515 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-859 |a DE-861 |a DE-634 | ||
111 | 2 | |a ESORICS |n 19. |d 2014 |c Breslau |j Verfasser |0 (DE-588)1059796732 |4 aut | |
245 | 1 | 0 | |a Computer security - ESORICS 2014 |b 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings |n 1 |c Mirosław Kutyłowski ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XV, 545 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8712 | |
490 | 0 | |a Lecture notes in computer science |v ... | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Kutyłowski, Mirosław |e Sonstige |0 (DE-588)1059797887 |4 oth | |
773 | 0 | 8 | |w (DE-604)BV042178477 |g 1 |
830 | 0 | |a Lecture notes in computer science |v 8712 |w (DE-604)BV014880109 |9 8712 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-11203-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027617800 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l TUM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-11203-9 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152686959919104 |
---|---|
adam_text | COMPUTER SECURITY - ESORICS 2014
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CRYPTOGRAPHY, FORMAL METHODS AND THEORY OF SECURITY
SECURITY SERVICES
INTRUSION/ANOMALY DETECTION AND MALWARE MITIGATION
SECURITY IN HARDWARE
SYSTEMS SECURITY
NETWORK SECURITY
DATABASE AND STORAGE SECURITY
SOFTWARE AND APPLICATION SECURITY
HUMAN AND SOCIETAL ASPECTS OF SECURITY AND PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
COMPUTER SECURITY - ESORICS 2014
/
: 2014
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME SET, LNCS 8712 AND LNCS 8713 CONSTITUTES THE REFEREED
PROCEEDINGS OF THE 19TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER
SECURITY, ESORICS 2014, HELD IN WROCLAW, POLAND, IN SEPTEMBER 2014 THE
58 REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED
FROM 234 SUBMISSIONS. THE PAPERS ADDRESS ISSUES SUCH AS CRYPTOGRAPHY,
FORMAL METHODS AND THEORY OF SECURITY, SECURITY SERVICES,
INTRUSION/ANOMALY DETECTION AND MALWARE MITIGATION, SECURITY IN
HARDWARE, SYSTEMS SECURITY, NETWORK SECURITY, DATABASE AND STORAGE
SECURITY, SOFTWARE AND APPLICATION SECURITY, HUMAN AND SOCIETAL ASPECTS
OF SECURITY AND PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)1059797887 |
author_corporate | ESORICS Breslau |
author_corporate_role | aut |
author_facet | ESORICS Breslau |
author_sort | ESORICS Breslau |
building | Verbundindex |
bvnumber | BV042178515 |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)897158422 (DE-599)BVBBV042178515 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-11203-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03334nmm a2200565 cc4500</leader><controlfield tag="001">BV042178515</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141111s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319112022</subfield><subfield code="9">978-3-319-11202-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319112039</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-319-11203-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-11203-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897158422</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042178515</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">19.</subfield><subfield code="d">2014</subfield><subfield code="c">Breslau</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1059796732</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security - ESORICS 2014</subfield><subfield code="b">19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings</subfield><subfield code="n">1</subfield><subfield code="c">Mirosław Kutyłowski ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 545 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8712</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">...</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kutyłowski, Mirosław</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1059797887</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="w">(DE-604)BV042178477</subfield><subfield code="g">1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8712</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8712</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027617800</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-11203-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042178515 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:14:40Z |
institution | BVB |
institution_GND | (DE-588)1059796732 |
isbn | 9783319112022 9783319112039 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027617800 |
oclc_num | 897158422 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
physical | 1 Online-Ressource (XV, 545 S.) graph. Darst. |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ESORICS 19. 2014 Breslau Verfasser (DE-588)1059796732 aut Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings 1 Mirosław Kutyłowski ... (eds.) Cham [u.a.] Springer 2014 1 Online-Ressource (XV, 545 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8712 Lecture notes in computer science ... (DE-588)1071861417 Konferenzschrift gnd-content Kutyłowski, Mirosław Sonstige (DE-588)1059797887 oth (DE-604)BV042178477 1 Lecture notes in computer science 8712 (DE-604)BV014880109 8712 https://doi.org/10.1007/978-3-319-11203-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings Lecture notes in computer science |
subject_GND | (DE-588)1071861417 |
title | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings |
title_auth | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings |
title_exact_search | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings |
title_full | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings 1 Mirosław Kutyłowski ... (eds.) |
title_fullStr | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings 1 Mirosław Kutyłowski ... (eds.) |
title_full_unstemmed | Computer security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings 1 Mirosław Kutyłowski ... (eds.) |
title_short | Computer security - ESORICS 2014 |
title_sort | computer security esorics 2014 19th european symposium on research in computer security wroclaw poland september 7 11 2014 proceedings |
title_sub | 19th European Symposium on Research in Computer Security, Wrocław, Poland, September 7 - 11, 2014 ; proceedings |
topic_facet | Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-11203-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027617800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV042178477 (DE-604)BV014880109 |
work_keys_str_mv | AT esoricsbreslau computersecurityesorics201419theuropeansymposiumonresearchincomputersecuritywrocławpolandseptember7112014proceedings1 AT kutyłowskimirosław computersecurityesorics201419theuropeansymposiumonresearchincomputersecuritywrocławpolandseptember7112014proceedings1 |