Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2021
Cham Springer |
Ausgabe: | 1st ed. 2021 |
Schriftenreihe: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
399 |
Schlagworte: | |
Online-Zugang: | BTU01 FCO01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FLA01 FRO01 FWS01 FWS02 HTW01 UBA01 UBG01 UBM01 UBT01 UBW01 UBY01 UER01 UPA01 UBR01 Volltext |
Beschreibung: | 1 Online-Ressource (XVII, 527 p. 138 illus., 96 illus. in color) |
ISBN: | 9783030900229 |
ISSN: | 1867-822X |
DOI: | 10.1007/978-3-030-90022-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047635650 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 211213s2021 |||| o||u| ||||||eng d | ||
020 | |a 9783030900229 |c Online |9 978-3-030-90022-9 | ||
024 | 7 | |a 10.1007/978-3-030-90022-9 |2 doi | |
035 | |a (ZDB-2-SCS)9783030900229 | ||
035 | |a (ZDB-2-LNS)9783030900229 | ||
035 | |a (OCoLC)1289761920 | ||
035 | |a (DE-599)BVBBV047635650 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-19 |a DE-858 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Security and Privacy in Communication Networks |b 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II |c edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung |
250 | |a 1st ed. 2021 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2021 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XVII, 527 p. 138 illus., 96 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 399 |x 1867-822X | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks / Security measures | |
700 | 1 | |a Garcia-Alfaro, Joaquin |4 edt | |
700 | 1 | |a Li, Shujun |4 edt | |
700 | 1 | |a Poovendran, Radha |4 edt | |
700 | 1 | |a Debar, Hervé |4 edt | |
700 | 1 | |a Yung, Moti |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-90021-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-90023-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-90022-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNS | ||
940 | 1 | |q ZDB-2-SCS_2021 | |
940 | 1 | |q ZDB-2-LNS_2021 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033019945 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l BTU01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FCO01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FHA01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FHD01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FHI01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FHM01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FHN01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FHR01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FLA01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FRO01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FWS01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l FWS02 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l HTW01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBA01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBG01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBM01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBT01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBW01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBY01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UER01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UPA01 |p ZDB-2-LNS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-90022-9 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 935433 |
---|---|
_version_ | 1806194929478664192 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Garcia-Alfaro, Joaquin Li, Shujun Poovendran, Radha Debar, Hervé Yung, Moti |
author2_role | edt edt edt edt edt |
author2_variant | j g a jga s l sl r p rp h d hd m y my |
author_facet | Garcia-Alfaro, Joaquin Li, Shujun Poovendran, Radha Debar, Hervé Yung, Moti |
building | Verbundindex |
bvnumber | BV047635650 |
collection | ZDB-2-SCS ZDB-2-LNS |
ctrlnum | (ZDB-2-SCS)9783030900229 (ZDB-2-LNS)9783030900229 (OCoLC)1289761920 (DE-599)BVBBV047635650 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-030-90022-9 |
edition | 1st ed. 2021 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04404nmm a2200817zcb4500</leader><controlfield tag="001">BV047635650</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211213s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030900229</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-90022-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-90022-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030900229</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNS)9783030900229</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289761920</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047635650</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Privacy in Communication Networks</subfield><subfield code="b">17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II</subfield><subfield code="c">edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 527 p. 138 illus., 96 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">399</subfield><subfield code="x">1867-822X</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garcia-Alfaro, Joaquin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Shujun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Poovendran, Radha</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Debar, Hervé</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yung, Moti</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-90021-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-90023-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2021</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNS_2021</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033019945</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-90022-9</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047635650 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:46:38Z |
indexdate | 2024-08-01T16:15:14Z |
institution | BVB |
isbn | 9783030900229 |
issn | 1867-822X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033019945 |
oclc_num | 1289761920 |
open_access_boolean | |
owner | DE-860 DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-860 DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVII, 527 p. 138 illus., 96 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-LNS ZDB-2-SCS_2021 ZDB-2-LNS_2021 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spellingShingle | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II Systems and Data Security Computer Communication Networks Cryptology Mobile and Network Security Computer security Computer communication systems Data encryption (Computer science) Computer networks / Security measures |
title | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II |
title_auth | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II |
title_exact_search | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II |
title_exact_search_txtP | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II |
title_full | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung |
title_fullStr | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung |
title_full_unstemmed | Security and Privacy in Communication Networks 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II edited by Joaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung |
title_short | Security and Privacy in Communication Networks |
title_sort | security and privacy in communication networks 17th eai international conference securecomm 2021 virtual event september 6 9 2021 proceedings part ii |
title_sub | 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II |
topic | Systems and Data Security Computer Communication Networks Cryptology Mobile and Network Security Computer security Computer communication systems Data encryption (Computer science) Computer networks / Security measures |
topic_facet | Systems and Data Security Computer Communication Networks Cryptology Mobile and Network Security Computer security Computer communication systems Data encryption (Computer science) Computer networks / Security measures |
url | https://doi.org/10.1007/978-3-030-90022-9 |
work_keys_str_mv | AT garciaalfarojoaquin securityandprivacyincommunicationnetworks17theaiinternationalconferencesecurecomm2021virtualeventseptember692021proceedingspartii AT lishujun securityandprivacyincommunicationnetworks17theaiinternationalconferencesecurecomm2021virtualeventseptember692021proceedingspartii AT poovendranradha securityandprivacyincommunicationnetworks17theaiinternationalconferencesecurecomm2021virtualeventseptember692021proceedingspartii AT debarherve securityandprivacyincommunicationnetworks17theaiinternationalconferencesecurecomm2021virtualeventseptember692021proceedingspartii AT yungmoti securityandprivacyincommunicationnetworks17theaiinternationalconferencesecurecomm2021virtualeventseptember692021proceedingspartii |