Foundations and practice of security: 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2018]
|
Schriftenreihe: | Lecture notes in computer science
10723 |
Schlagworte: | |
Beschreibung: | XIII, 318 Seiten Diagramme |
ISBN: | 9783319756493 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044797963 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 180227s2018 xx |||| |||| 10||| eng d | ||
020 | |a 9783319756493 |9 978-3-319-75649-3 | ||
035 | |a (OCoLC)1027154918 | ||
035 | |a (DE-599)BVBBV044797963 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.82 |2 23 | |
245 | 1 | 0 | |a Foundations and practice of security |b 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers |c Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.) |
264 | 1 | |a Cham |b Springer |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a XIII, 318 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10723 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Biometrics (Biology) | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Security | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Biometrics | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a RFID |0 (DE-588)4509863-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verifikation |0 (DE-588)4135577-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chipkarte |0 (DE-588)4147723-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Web Services |0 (DE-588)4691234-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2017 |z Nancy |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 2 | |a Chipkarte |0 (DE-588)4147723-6 |D s |
689 | 0 | 3 | |a RFID |0 (DE-588)4509863-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 1 | 2 | |a Verifikation |0 (DE-588)4135577-5 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 2 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 3 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 3 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 3 | |a Serviceorientierte Architektur |0 (DE-588)4841015-9 |D s |
689 | 3 | 4 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 3 | 5 | |a Web Services |0 (DE-588)4691234-4 |D s |
689 | 3 | |8 1\p |5 DE-604 | |
700 | 1 | |a Imine, Abdessamad |4 edt | |
711 | 2 | |a FPS |n 10. |d 2017 |c Nancy |0 (DE-588)1153435071 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-75650-9 |
830 | 0 | |a Lecture notes in computer science |v 10723 |w (DE-604)BV000000607 |9 10723 | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030193000 |
Datensatz im Suchindex
_version_ | 1820875713559920640 |
---|---|
adam_text | |
any_adam_object | |
author2 | Imine, Abdessamad |
author2_role | edt |
author2_variant | a i ai |
author_facet | Imine, Abdessamad |
building | Verbundindex |
bvnumber | BV044797963 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)1027154918 (DE-599)BVBBV044797963 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044797963</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180227s2018 xx |||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319756493</subfield><subfield code="9">978-3-319-75649-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027154918</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044797963</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations and practice of security</subfield><subfield code="b">10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers</subfield><subfield code="c">Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 318 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10723</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics (Biology)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometrics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chipkarte</subfield><subfield code="0">(DE-588)4147723-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2017</subfield><subfield code="z">Nancy</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chipkarte</subfield><subfield code="0">(DE-588)4147723-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Serviceorientierte Architektur</subfield><subfield code="0">(DE-588)4841015-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="5"><subfield code="a">Web Services</subfield><subfield code="0">(DE-588)4691234-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Imine, Abdessamad</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">FPS</subfield><subfield code="n">10.</subfield><subfield code="d">2017</subfield><subfield code="c">Nancy</subfield><subfield code="0">(DE-588)1153435071</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-75650-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10723</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10723</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030193000</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2017 Nancy gnd-content |
genre_facet | Konferenzschrift 2017 Nancy |
id | DE-604.BV044797963 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:20:01Z |
institution | BVB |
institution_GND | (DE-588)1153435071 |
isbn | 9783319756493 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030193000 |
oclc_num | 1027154918 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XIII, 318 Seiten Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.) Cham Springer [2018] © 2018 XIII, 318 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10723 Computer science Computer communication systems Data encryption (Computer science) Coding theory Algorithms Biometrics (Biology) Computer Science Data Encryption Security Coding and Information Theory Computer Communication Networks Biometrics Informatik Formale Methode (DE-588)4333722-3 gnd rswk-swf Serviceorientierte Architektur (DE-588)4841015-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf RFID (DE-588)4509863-3 gnd rswk-swf Verifikation (DE-588)4135577-5 gnd rswk-swf Chipkarte (DE-588)4147723-6 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Web Services (DE-588)4691234-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2017 Nancy gnd-content Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s Chipkarte (DE-588)4147723-6 s RFID (DE-588)4509863-3 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Chiffrierung (DE-588)4352893-4 s Verifikation (DE-588)4135577-5 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Formale Methode (DE-588)4333722-3 s Zugriffskontrolle (DE-588)4293034-0 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s Serviceorientierte Architektur (DE-588)4841015-9 s Informationssystem (DE-588)4072806-7 s Web Services (DE-588)4691234-4 s 1\p DE-604 Imine, Abdessamad edt FPS 10. 2017 Nancy (DE-588)1153435071 oth Erscheint auch als Online-Ausgabe 978-3-319-75650-9 Lecture notes in computer science 10723 (DE-604)BV000000607 10723 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers Lecture notes in computer science Computer science Computer communication systems Data encryption (Computer science) Coding theory Algorithms Biometrics (Biology) Computer Science Data Encryption Security Coding and Information Theory Computer Communication Networks Biometrics Informatik Formale Methode (DE-588)4333722-3 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Informationssystem (DE-588)4072806-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd RFID (DE-588)4509863-3 gnd Verifikation (DE-588)4135577-5 gnd Chipkarte (DE-588)4147723-6 gnd Chiffrierung (DE-588)4352893-4 gnd Rechnernetz (DE-588)4070085-9 gnd Web Services (DE-588)4691234-4 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4841015-9 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4072806-7 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)4509863-3 (DE-588)4135577-5 (DE-588)4147723-6 (DE-588)4352893-4 (DE-588)4070085-9 (DE-588)4691234-4 (DE-588)1071861417 |
title | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers |
title_auth | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers |
title_exact_search | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers |
title_full | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.) |
title_fullStr | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.) |
title_full_unstemmed | Foundations and practice of security 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.) |
title_short | Foundations and practice of security |
title_sort | foundations and practice of security 10th international symposium fps 2017 nancy france october 23 25 2017 revised selected papers |
title_sub | 10th international symposium, FPS 2017, Nancy, France, October 23-25, 2017 : revised selected papers |
topic | Computer science Computer communication systems Data encryption (Computer science) Coding theory Algorithms Biometrics (Biology) Computer Science Data Encryption Security Coding and Information Theory Computer Communication Networks Biometrics Informatik Formale Methode (DE-588)4333722-3 gnd Serviceorientierte Architektur (DE-588)4841015-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Informationssystem (DE-588)4072806-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd RFID (DE-588)4509863-3 gnd Verifikation (DE-588)4135577-5 gnd Chipkarte (DE-588)4147723-6 gnd Chiffrierung (DE-588)4352893-4 gnd Rechnernetz (DE-588)4070085-9 gnd Web Services (DE-588)4691234-4 gnd |
topic_facet | Computer science Computer communication systems Data encryption (Computer science) Coding theory Algorithms Biometrics (Biology) Computer Science Data Encryption Security Coding and Information Theory Computer Communication Networks Biometrics Informatik Formale Methode Serviceorientierte Architektur Kryptoanalyse Kryptosystem Informationssystem Computersicherheit Kryptologie Datensicherung Zugriffskontrolle Privatsphäre RFID Verifikation Chipkarte Chiffrierung Rechnernetz Web Services Konferenzschrift 2017 Nancy |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT imineabdessamad foundationsandpracticeofsecurity10thinternationalsymposiumfps2017nancyfranceoctober23252017revisedselectedpapers AT fpsnancy foundationsandpracticeofsecurity10thinternationalsymposiumfps2017nancyfranceoctober23252017revisedselectedpapers |