Computer security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , , , , , , , , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2020]
|
Schriftenreihe: | Security and cryptology
12580 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-Aug4 DE-573 DE-M347 DE-92 DE-898 DE-859 DE-860 DE-861 DE-863 DE-862 DE-523 DE-91 DE-384 DE-473 DE-19 DE-355 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource Illustrationen, Diagramme |
ISBN: | 9783030665043 |
DOI: | 10.1007/978-3-030-66504-3 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV047093590 | ||
003 | DE-604 | ||
005 | 20221205 | ||
007 | cr|uuu---uuuuu | ||
008 | 210119s2020 xx a||| o|||| 10||| eng d | ||
020 | |a 9783030665043 |c Online |9 978-3-030-66504-3 | ||
024 | 7 | |a 10.1007/978-3-030-66504-3 |2 doi | |
035 | |a (ZDB-2-SCS)9783030665043 | ||
035 | |a (ZDB-2-LNC)9783030665043 | ||
035 | |a (OCoLC)1232511994 | ||
035 | |a (DE-599)BVBBV047093590 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-860 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-384 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 461 |2 stub | ||
084 | |a DAT 460 |2 stub | ||
084 | |a DAT 465 |2 stub | ||
084 | |a DAT 050 |2 stub | ||
111 | 2 | |a ESORICS |n 25. |d 2020 |c Online |j Verfasser |0 (DE-588)1219537969 |4 aut | |
245 | 1 | 0 | |a Computer security |b ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers |c Ioana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela Sasse (eds.) |
264 | 1 | |a Cham, Switzerland |b Springer |c [2020] | |
300 | |a 1 Online-Ressource |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 12580 |a Security and cryptology | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Computer Applications | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Security Services | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Application software | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2020 |z Online |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Boureanu, Ioana Cristina |d 1985- |0 (DE-588)1053757476 |4 edt | |
700 | 1 | |a Drăgan, Constantin Cătălin |4 edt | |
700 | 1 | |a Manulis, Mark |0 (DE-588)142899755 |4 edt | |
700 | 1 | |a Giannetsos, Thanassis |0 (DE-588)1206217421 |4 edt | |
700 | 1 | |a Dadoyan, Christoforos |4 edt | |
700 | 1 | |a Gouvas, Panagiotis |4 edt | |
700 | 1 | |a Hallman, Roger A. |4 edt | |
700 | 1 | |a Li, Shujun |4 edt | |
700 | 1 | |a Chang, Victor |d 1976- |0 (DE-588)1036868036 |4 edt | |
700 | 1 | |a Pallas, Frank |4 edt | |
700 | 1 | |a Pohle, Jörg |d 1979- |0 (DE-588)1054193274 |4 edt | |
700 | 1 | |a Sasse, M. Angela |0 (DE-588)1089294522 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-66503-6 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-66505-0 |
830 | 0 | |a Security and cryptology |v 12580 |w (DE-604)BV014880109 |9 12580 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-66504-3 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032500105&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2020 | |
940 | 1 | |q ZDB-2-LNC_2020 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032500105 | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-860 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-863 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-862 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-523 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2020 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-355 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-66504-3 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 866060 |
---|---|
_version_ | 1818020677859409920 |
adam_text |
TABLE
OF
CONTENTS
1.
INTRODUCTION
.
I
PART
I
REGIONAL
IDENTITIES
2.
EAST
PRUSSIA
-
POLITICS
AND
MEMORY
.
7
KRZYSZTOF
GLADKOWSKI
3.
HISTORICAL
MEMORY
AND
IDENTITY
OF
BORDERLANDS:
THE
CASE
OF
THE
WARMIA
AND
MAZURY
REGION
AND
THE
KALININGRAD
REGION
.
41
KRZYSZTOF
ZYGOTA
4.
TOWARDS
THE
REGIONAL
IDENTITY
OF
THE
INHABITANTS
OF
THE
POLISH-RUSSIAN
BORDERLAND
.
51
ARKADIUSZ
ZUKOWSKI
5.
TATAR
ETHNIC
MINORITY
IN
THE
KALININGRAD
REGION
-
CULTURAL
AND
RELIGIOUS
ACTIVITY
.
75
SELIM
CHAZBIJEWICZ
PART
II
(INTER
)REGIONAL
POLICIES
6.
THE
SPECIFICITY
OF
THE
KALININGRAD
REGION
IN
THE
ADMINISTRATIVE
SYSTEM
OF
THE
RUSSIAN
FEDERATION
.
83
WCDDEMAR
TOMASZEWSKI
7.
POLITICAL
PARTICIPATION
IN
THE
KALININGRAD
REGION
OF
THE
RUSSIAN
FEDERATION
.
93
KAROLINA
TYBUCHOWSKA-HARTLINSKA
8.
THE
ATTITUDE
OF
POLISH
POLITICAL
PARTIES
TOWARDS
THE
KALININGRAD
REGION
IN
1989-2019
.
103
TOMASZ
BOJAROWICZ
VI
TABLE
OF
CONTENTS
9.
THE
KALININGRAD
REGION
IN
THE
OLSZTYN
MEDIA
.
119
KATARZYNAMACIEJEWSKA-MIESZKOWSKA
10.
THE
LOCAL
BORDER
TRAFFIC
BETWEEN
POLAND
AND
RUSSIA
-
POLITICAL
AND
SECURITY
DIMENSION
.
135
WOJCIECH
KOTOWICZ
11.
PARADIPLOMACY
BETWEEN
POLISH
REGIONS
AND
THE
KALININGRAD
REGION
.
151
WOJCIECH
T
MODZELEWSKI
12.
COOPERATION
BETWEEN
THE
WARMIA
AND
MAZURY
REGION
AND
THE
KALININGRAD
REGION
AND
ITS
PERSPECTIVES
.
161
LUKASZ
BIEIEWSKI
13.
COOPERATION
OF
THE
REGIONAL
AND
LOCAL
AUTHORITIES
OF
THE
WARMIA
AND
MAZURY
REGION
AND
THE
KALININGRAD
REGION
.
175
TERESA
ASTRAMOWICZ-LEYK
PART
III
GEOPOLITICAL
PERSPECTIVES
14.
THE
LASTING
CONSEQUENCES
OF
GEOPOLITICAL
MISTAKES
-
SOME
REALIST
CONCLUSIONS
ON
THE
DUCHY
OF
PRUSSIA
AND
ITS
ROLE
IN
THE
HISTORY
OF
POLAND
.
191
JACEK
WIGCTAWSKI
15.
HISTORICAL
BACKGROUND
AND
SPECIFICITY
OF
THE
KALININGRAD
REGION
IN
EUROPE
-
A
LOCAL
PERSPECTIVE
OUTLOOK
.
223
BENON
GAZINSKI
16.
THE
KALININGRAD
REGION:
AN
EXCLAVE
WITH
INTERNAL
AND
EXTERNAL
PROBLEMS
.
241
INGMAR
OLDBERG
17.
THE
SIGNIFICANCE
OF
THE
KALININGRAD
REGION
IN
THE
INTERNATIONAL
POLITICS
IN
THE
BALTIC
SEA
REGION
AFTER
1989
.
263
MARCIN
CHETMINIAK
TABLE
OF
CONTENTS
VII
PART
IV
RESEARCH
PERSPECTIVES
18.
SCIENTIFIC
ACTIVITY
OF
THE
INSTITUTE
OF
POLITICAL
SCIENCE
OF
THE
UNIVERSITY
OF
WARMIA
AND
MAZURY
IN
OLSZTYN
ON
THE
KALININGRAD
REGION
.
279
ARKADIUSZ
ZUKOWSKI,
MARCIN
CHELMINIAK,
WOJCIECH
KOTOWICZ,
KRZYSZTOF
ZYGOTA
19.
INTERNATIONAL
ACTIVITY
AND
COOPERATION
OF
UNIVERSITIES
-
THE
EUROPEAN
UNION
FROM
THE
KALININGRAD
POINT
OF
VIEW
.
293
ANNA
BARSUKOVA,
IGOR
I.
ZHUKOVSKIY
LIST
OF
SCIENTIFIC
PUBLICATIONS
ON
THE
KALININGRAD
REGION
PREPARED
BY
THE
INSTITUTE
OF
POLITICAL
SCIENCE,
UNIVERSITY
OF
WARMIA
AND
MAZURY
IN
OLSZTYN
.
303
LIST
OF
AUTHORS
.
325 |
adam_txt |
TABLE
OF
CONTENTS
1.
INTRODUCTION
.
I
PART
I
REGIONAL
IDENTITIES
2.
EAST
PRUSSIA
-
POLITICS
AND
MEMORY
.
7
KRZYSZTOF
GLADKOWSKI
3.
HISTORICAL
MEMORY
AND
IDENTITY
OF
BORDERLANDS:
THE
CASE
OF
THE
WARMIA
AND
MAZURY
REGION
AND
THE
KALININGRAD
REGION
.
41
KRZYSZTOF
ZYGOTA
4.
TOWARDS
THE
REGIONAL
IDENTITY
OF
THE
INHABITANTS
OF
THE
POLISH-RUSSIAN
BORDERLAND
.
51
ARKADIUSZ
ZUKOWSKI
5.
TATAR
ETHNIC
MINORITY
IN
THE
KALININGRAD
REGION
-
CULTURAL
AND
RELIGIOUS
ACTIVITY
.
75
SELIM
CHAZBIJEWICZ
PART
II
(INTER
)REGIONAL
POLICIES
6.
THE
SPECIFICITY
OF
THE
KALININGRAD
REGION
IN
THE
ADMINISTRATIVE
SYSTEM
OF
THE
RUSSIAN
FEDERATION
.
83
WCDDEMAR
TOMASZEWSKI
7.
POLITICAL
PARTICIPATION
IN
THE
KALININGRAD
REGION
OF
THE
RUSSIAN
FEDERATION
.
93
KAROLINA
TYBUCHOWSKA-HARTLINSKA
8.
THE
ATTITUDE
OF
POLISH
POLITICAL
PARTIES
TOWARDS
THE
KALININGRAD
REGION
IN
1989-2019
.
103
TOMASZ
BOJAROWICZ
VI
TABLE
OF
CONTENTS
9.
THE
KALININGRAD
REGION
IN
THE
OLSZTYN
MEDIA
.
119
KATARZYNAMACIEJEWSKA-MIESZKOWSKA
10.
THE
LOCAL
BORDER
TRAFFIC
BETWEEN
POLAND
AND
RUSSIA
-
POLITICAL
AND
SECURITY
DIMENSION
.
135
WOJCIECH
KOTOWICZ
11.
PARADIPLOMACY
BETWEEN
POLISH
REGIONS
AND
THE
KALININGRAD
REGION
.
151
WOJCIECH
T
MODZELEWSKI
12.
COOPERATION
BETWEEN
THE
WARMIA
AND
MAZURY
REGION
AND
THE
KALININGRAD
REGION
AND
ITS
PERSPECTIVES
.
161
LUKASZ
BIEIEWSKI
13.
COOPERATION
OF
THE
REGIONAL
AND
LOCAL
AUTHORITIES
OF
THE
WARMIA
AND
MAZURY
REGION
AND
THE
KALININGRAD
REGION
.
175
TERESA
ASTRAMOWICZ-LEYK
PART
III
GEOPOLITICAL
PERSPECTIVES
14.
THE
LASTING
CONSEQUENCES
OF
GEOPOLITICAL
MISTAKES
-
SOME
REALIST
CONCLUSIONS
ON
THE
DUCHY
OF
PRUSSIA
AND
ITS
ROLE
IN
THE
HISTORY
OF
POLAND
.
191
JACEK
WIGCTAWSKI
15.
HISTORICAL
BACKGROUND
AND
SPECIFICITY
OF
THE
KALININGRAD
REGION
IN
EUROPE
-
A
LOCAL
PERSPECTIVE
OUTLOOK
.
223
BENON
GAZINSKI
16.
THE
KALININGRAD
REGION:
AN
EXCLAVE
WITH
INTERNAL
AND
EXTERNAL
PROBLEMS
.
241
INGMAR
OLDBERG
17.
THE
SIGNIFICANCE
OF
THE
KALININGRAD
REGION
IN
THE
INTERNATIONAL
POLITICS
IN
THE
BALTIC
SEA
REGION
AFTER
1989
.
263
MARCIN
CHETMINIAK
TABLE
OF
CONTENTS
VII
PART
IV
RESEARCH
PERSPECTIVES
18.
SCIENTIFIC
ACTIVITY
OF
THE
INSTITUTE
OF
POLITICAL
SCIENCE
OF
THE
UNIVERSITY
OF
WARMIA
AND
MAZURY
IN
OLSZTYN
ON
THE
KALININGRAD
REGION
.
279
ARKADIUSZ
ZUKOWSKI,
MARCIN
CHELMINIAK,
WOJCIECH
KOTOWICZ,
KRZYSZTOF
ZYGOTA
19.
INTERNATIONAL
ACTIVITY
AND
COOPERATION
OF
UNIVERSITIES
-
THE
EUROPEAN
UNION
FROM
THE
KALININGRAD
POINT
OF
VIEW
.
293
ANNA
BARSUKOVA,
IGOR
I.
ZHUKOVSKIY
LIST
OF
SCIENTIFIC
PUBLICATIONS
ON
THE
KALININGRAD
REGION
PREPARED
BY
THE
INSTITUTE
OF
POLITICAL
SCIENCE,
UNIVERSITY
OF
WARMIA
AND
MAZURY
IN
OLSZTYN
.
303
LIST
OF
AUTHORS
.
325 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author2 | Boureanu, Ioana Cristina 1985- Drăgan, Constantin Cătălin Manulis, Mark Giannetsos, Thanassis Dadoyan, Christoforos Gouvas, Panagiotis Hallman, Roger A. Li, Shujun Chang, Victor 1976- Pallas, Frank Pohle, Jörg 1979- Sasse, M. Angela |
author2_role | edt edt edt edt edt edt edt edt edt edt edt edt |
author2_variant | i c b ic icb c c d cc ccd m m mm t g tg c d cd p g pg r a h ra rah s l sl v c vc f p fp j p jp m a s ma mas |
author_GND | (DE-588)1053757476 (DE-588)142899755 (DE-588)1206217421 (DE-588)1036868036 (DE-588)1054193274 (DE-588)1089294522 |
author_corporate | ESORICS Online |
author_corporate_role | aut |
author_facet | Boureanu, Ioana Cristina 1985- Drăgan, Constantin Cătălin Manulis, Mark Giannetsos, Thanassis Dadoyan, Christoforos Gouvas, Panagiotis Hallman, Roger A. Li, Shujun Chang, Victor 1976- Pallas, Frank Pohle, Jörg 1979- Sasse, M. Angela ESORICS Online |
author_sort | ESORICS Online |
building | Verbundindex |
bvnumber | BV047093590 |
classification_rvk | SS 4800 |
classification_tum | DAT 461 DAT 460 DAT 465 DAT 050 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783030665043 (ZDB-2-LNC)9783030665043 (OCoLC)1232511994 (DE-599)BVBBV047093590 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-030-66504-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV047093590</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221205</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210119s2020 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030665043</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-66504-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-66504-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030665043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030665043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1232511994</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047093590</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">25.</subfield><subfield code="d">2020</subfield><subfield code="c">Online</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1219537969</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security</subfield><subfield code="b">ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers</subfield><subfield code="c">Ioana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela Sasse (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">12580</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2020</subfield><subfield code="z">Online</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Boureanu, Ioana Cristina</subfield><subfield code="d">1985-</subfield><subfield code="0">(DE-588)1053757476</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Drăgan, Constantin Cătălin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manulis, Mark</subfield><subfield code="0">(DE-588)142899755</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Giannetsos, Thanassis</subfield><subfield code="0">(DE-588)1206217421</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dadoyan, Christoforos</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gouvas, Panagiotis</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hallman, Roger A.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Shujun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chang, Victor</subfield><subfield code="d">1976-</subfield><subfield code="0">(DE-588)1036868036</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pallas, Frank</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pohle, Jörg</subfield><subfield code="d">1979-</subfield><subfield code="0">(DE-588)1054193274</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sasse, M. Angela</subfield><subfield code="0">(DE-588)1089294522</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-66503-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-66505-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Security and cryptology</subfield><subfield code="v">12580</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">12580</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032500105&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2020</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032500105</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2020</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-66504-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2020 Online gnd-content |
genre_facet | Konferenzschrift 2020 Online |
id | DE-604.BV047093590 |
illustrated | Illustrated |
index_date | 2024-07-03T16:20:29Z |
indexdate | 2024-12-10T04:00:26Z |
institution | BVB |
institution_GND | (DE-588)1219537969 |
isbn | 9783030665043 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032500105 |
oclc_num | 1232511994 |
open_access_boolean | |
owner | DE-573 DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-384 DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-573 DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-384 DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource Illustrationen, Diagramme |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2020 ZDB-2-LNC_2020 ZDB-2-LNC ZDB-2-LNC_2020 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series | Security and cryptology |
series2 | Lecture notes in computer science Security and cryptology |
spellingShingle | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers Security and cryptology Cryptology Computer Applications Computer Communication Networks Security Services Computing Milieux Data encryption (Computer science) Application software Computer communication systems Computer security Computers Datensicherung (DE-588)4011144-1 gnd Anwendungssoftware (DE-588)4120906-0 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4120906-0 (DE-588)4033329-2 (DE-588)1071861417 |
title | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers |
title_auth | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers |
title_exact_search | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers |
title_exact_search_txtP | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers |
title_full | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers Ioana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela Sasse (eds.) |
title_fullStr | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers Ioana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela Sasse (eds.) |
title_full_unstemmed | Computer security ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers Ioana Boureanu, Constantin Cătălin Drăgan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, Angela Sasse (eds.) |
title_short | Computer security |
title_sort | computer security esorics 2020 international workshops detips desecsys mps and spose guildford uk september 17 18 2020 revised selected papers |
title_sub | ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020 : revised selected papers |
topic | Cryptology Computer Applications Computer Communication Networks Security Services Computing Milieux Data encryption (Computer science) Application software Computer communication systems Computer security Computers Datensicherung (DE-588)4011144-1 gnd Anwendungssoftware (DE-588)4120906-0 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptology Computer Applications Computer Communication Networks Security Services Computing Milieux Data encryption (Computer science) Application software Computer communication systems Computer security Computers Datensicherung Anwendungssoftware Kryptologie Konferenzschrift 2020 Online |
url | https://doi.org/10.1007/978-3-030-66504-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032500105&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT esoricsonline computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT boureanuioanacristina computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT draganconstantincatalin computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT manulismark computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT giannetsosthanassis computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT dadoyanchristoforos computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT gouvaspanagiotis computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT hallmanrogera computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT lishujun computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT changvictor computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT pallasfrank computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT pohlejorg computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers AT sassemangela computersecurityesorics2020internationalworkshopsdetipsdesecsysmpsandsposeguildfordukseptember17182020revisedselectedpapers |