ICT systems security and privacy protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2016]
|
Schriftenreihe: | IFIP Advances in Information and Communication Technology
471 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FRO01 HTW01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 414 Seiten, 82 illus) |
ISBN: | 9783319336305 |
ISSN: | 1868-4238 |
DOI: | 10.1007/978-3-319-33630-5 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043579450 | ||
003 | DE-604 | ||
005 | 20160725 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160601s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319336305 |c Online |9 978-3-319-33630-5 | ||
024 | 7 | |a 10.1007/978-3-319-33630-5 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-319-33630-5 | ||
035 | |a (OCoLC)951065646 | ||
035 | |a (DE-599)BVBBV043579450 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
111 | 2 | |a International Conference on ICT Systems Security and Privacy Protection |n 31. |d 2016 |c Gent |j Verfasser |0 (DE-588)1108097308 |4 aut | |
245 | 1 | 0 | |a ICT systems security and privacy protection |b 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings |c Jaap-Henk Hoepman, Stefan Katzenbeisser (eds.) |
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (XIII, 414 Seiten, 82 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a IFIP advances in information and communication technology |v 471 |x 1868-4238 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems Applications (incl. Internet) | |
650 | 4 | |a Informatik | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2016 |z Gent |2 gnd-content | |
700 | 1 | |a Hoepman, Jaap-Henk |4 edt | |
700 | 1 | |a Katzenbeisser, Stefan |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-33629-9 |
830 | 0 | |a IFIP Advances in Information and Communication Technology |v 471 |w (DE-604)BV035839733 |9 471 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-33630-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028994122 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-33630-5 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176260567400448 |
---|---|
adam_text | ICT SYSTEMS SECURITY AND PRIVACY PROTECTION
/
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
COERCION-RESISTANT PROXY VOTING
A POSTERIORI OPENABLE PUBLIC KEY ENCRYPTION.-MULTICAST DELAYED
AUTHENTICATION FOR STREAMING SYNCHROPHASOR DATA IN THE SMART GRID
DEVELOPING A HUMAN ACTIVITY MODEL FOR INSIDER IS SECURITY BREACHES USING
ACTION DESIGN RESEARCH
EVALUATING CVSS BASE SCORE USING VULNERABILITY REWARDS PROGRAMS
DEFINING OBJECTIVES FOR PREVENTING CYBERSTALKING
USING PROCESS INVARIANTS TO DETECT CYBER ATTACKS ON A WATER TREATMENT
SYSTEM
EXPRESSION AND ENFORCEMENT OF SECURITY POLICY FOR VIRTUAL RESOURCE
ALLOCATION IN IAAS CLOUD
SOFTWARE DEFINED NETWORKING REACTIVE STATEFUL FIREWALL
TEACHING PHISHING-SECURITY: WHICH WAY IS BEST?
ON GENDER SPECIFIC PERCEPTION OF DATA SHARING IN JAPAN
TORPEDO: TOOLTIP-POWERED PHISHING EMAIL DETECTION
SYBILRADAR: A GRAPH-STRUCTURE BASED FRAMEWORK FOR SYBIL DETECTION IN
ONLINE SOCIAL NETWORKS
COLLATERAL DAMAGE OF FACEBOOK APPS: FRIENDS, PROVIDERS, AND PRIVACY
INTERDEPENDENCE
AUTOMATED SOURCE CODE INSTRUMENTATION FOR VERIFYING POTENTIAL
VULNERABILITIES
AN INFORMATION FLOW-BASED TAXONOMY TO UNDERSTAND THE NATURE OF SOFTWARE
VULNERABILITIES
DISSECTING THE XSS EXPLOITATION TECHNIQUES AND FUZZING MECHANISMS OF
BLACKBOX SCANNERS
A UTILITY-BASED REPUTATION MODEL FOR THE INTERNET OF THINGS
ADVANCED REMOTE FIRMWARE UPGRADES USING TPM 2.0
REGRSA: USING REGISTERS AS BUFFERS TO RESIST MEMORY DISCLOSURE ATTACKS
UNCERTAIN? NO, IT S VERY CERTAIN! RECOVERING THE KEY FROM GUESSING
ENTROPY ENHANCED CPA
ADVANCED OR NOT? A COMPARATIVE STUDY OF THE USE OF ANTI-DEBUGGING AND
ANTI-VM TECHNIQUES IN GENERIC AND TARGETED MALWARE
NATIVEPROTECTOR: PROTECTING ANDROID APPLICATIONS BY ISOLATING AND
INTERCEPTING THIRD-PARTY NATIVE LIBRARIES
A PROGRESS-SENSITIVE FLOW-SENSITIVE INLINED INFORMATION-FLOW CONTROL
MONITOR
DEDUCING USER PRESENCE FROM INTER-MESSAGE INTERVALS IN HOME AUTOMATION
SYSTEMS
PRIVACY BY DESIGN PRINCIPLES IN DESIGN OF NEW GENERATION COGNITIVE
ASSISTIVE TECHNOLOGIES
A TRUSTLESS PRIVACY-PRESERVING REPUTATION SYSTEM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION
/
: 2016
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 31ST IFIP TC 11
INTERNATIONAL CONFERENCE ON ICT SYSTEMS SECURITY AND PRIVACY PROTECTION,
SEC 2016, HELD IN GHENT, BELGIUM, IN MAY/JUNE 2016. THE 27 REVISED FULL
PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 139
SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON
CRYPTOGRAPHIC PROTOCOLS, HUMAN ASPECTS OF SECURITY, CYBER
INFRASTRUCTURE, SOCIAL NETWORKS, SOFTWARE VULNERABILITIES, TPM AND
INTERNET OF THINGS, SIDECHANNEL ANALYSIS, SOFTWARE SECURITY, AND PRIVACY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Hoepman, Jaap-Henk Katzenbeisser, Stefan |
author2_role | edt edt |
author2_variant | j h h jhh s k sk |
author_corporate | International Conference on ICT Systems Security and Privacy Protection Gent |
author_corporate_role | aut |
author_facet | Hoepman, Jaap-Henk Katzenbeisser, Stefan International Conference on ICT Systems Security and Privacy Protection Gent |
author_sort | International Conference on ICT Systems Security and Privacy Protection Gent |
building | Verbundindex |
bvnumber | BV043579450 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-319-33630-5 (OCoLC)951065646 (DE-599)BVBBV043579450 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-33630-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04366nmm a2200781zcb4500</leader><controlfield tag="001">BV043579450</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160725 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160601s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319336305</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-33630-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-33630-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-319-33630-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)951065646</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043579450</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">International Conference on ICT Systems Security and Privacy Protection</subfield><subfield code="n">31.</subfield><subfield code="d">2016</subfield><subfield code="c">Gent</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1108097308</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ICT systems security and privacy protection</subfield><subfield code="b">31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings</subfield><subfield code="c">Jaap-Henk Hoepman, Stefan Katzenbeisser (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 414 Seiten, 82 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IFIP advances in information and communication technology</subfield><subfield code="v">471</subfield><subfield code="x">1868-4238</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems Applications (incl. Internet)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Gent</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoepman, Jaap-Henk</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katzenbeisser, Stefan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-33629-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">471</subfield><subfield code="w">(DE-604)BV035839733</subfield><subfield code="9">471</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028994122</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-33630-5</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2016 Gent gnd-content |
genre_facet | Konferenzschrift 2016 Gent |
id | DE-604.BV043579450 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:29:21Z |
institution | BVB |
institution_GND | (DE-588)1108097308 |
isbn | 9783319336305 |
issn | 1868-4238 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028994122 |
oclc_num | 951065646 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-573 DE-M347 DE-703 DE-739 DE-634 |
physical | 1 Online-Ressource (XIII, 414 Seiten, 82 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
series | IFIP Advances in Information and Communication Technology |
series2 | IFIP advances in information and communication technology |
spelling | International Conference on ICT Systems Security and Privacy Protection 31. 2016 Gent Verfasser (DE-588)1108097308 aut ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings Jaap-Henk Hoepman, Stefan Katzenbeisser (eds.) [Cham] Springer [2016] © 2016 1 Online-Ressource (XIII, 414 Seiten, 82 illus) txt rdacontent c rdamedia cr rdacarrier IFIP advances in information and communication technology 471 1868-4238 Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Computer Science Systems and Data Security Data Encryption Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) Informatik (DE-588)1071861417 Konferenzschrift 2016 Gent gnd-content Hoepman, Jaap-Henk edt Katzenbeisser, Stefan edt Erscheint auch als Druckausgabe 978-3-319-33629-9 IFIP Advances in Information and Communication Technology 471 (DE-604)BV035839733 471 https://doi.org/10.1007/978-3-319-33630-5 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings IFIP Advances in Information and Communication Technology Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Computer Science Systems and Data Security Data Encryption Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) Informatik |
subject_GND | (DE-588)1071861417 |
title | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings |
title_auth | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings |
title_exact_search | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings |
title_full | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings Jaap-Henk Hoepman, Stefan Katzenbeisser (eds.) |
title_fullStr | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings Jaap-Henk Hoepman, Stefan Katzenbeisser (eds.) |
title_full_unstemmed | ICT systems security and privacy protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings Jaap-Henk Hoepman, Stefan Katzenbeisser (eds.) |
title_short | ICT systems security and privacy protection |
title_sort | ict systems security and privacy protection 31st ifip tc 11 international conference sec 2016 ghent belgium may 30 june 1 2016 proceedings |
title_sub | 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016 : proceedings |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Computer Science Systems and Data Security Data Encryption Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) Informatik |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers and civilization Computer Science Systems and Data Security Data Encryption Computers and Society Computer Communication Networks Information Systems Applications (incl. Internet) Informatik Konferenzschrift 2016 Gent |
url | https://doi.org/10.1007/978-3-319-33630-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028994122&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV035839733 |
work_keys_str_mv | AT internationalconferenceonictsystemssecurityandprivacyprotectiongent ictsystemssecurityandprivacyprotection31stifiptc11internationalconferencesec2016ghentbelgiummay30june12016proceedings AT hoepmanjaaphenk ictsystemssecurityandprivacyprotection31stifiptc11internationalconferencesec2016ghentbelgiummay30june12016proceedings AT katzenbeisserstefan ictsystemssecurityandprivacyprotection31stifiptc11internationalconferencesec2016ghentbelgiummay30june12016proceedings |