Ubiquitous Security: First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Singapore
2022
Singapore Springer |
Ausgabe: | 1st ed. 2022 |
Schriftenreihe: | Communications in Computer and Information Science
1557 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UEI01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XVII, 380 p. 148 illus., 114 illus. in color) |
ISBN: | 9789811904684 |
ISSN: | 1865-0937 |
DOI: | 10.1007/978-981-19-0468-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047875522 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220309s2022 |||| o||u| ||||||eng d | ||
020 | |a 9789811904684 |c Online |9 978-981-1904-68-4 | ||
024 | 7 | |a 10.1007/978-981-19-0468-4 |2 doi | |
035 | |a (ZDB-2-SCS)9789811904684 | ||
035 | |a (OCoLC)1304475718 | ||
035 | |a (DE-599)BVBBV047875522 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-824 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.3 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Ubiquitous Security |b First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers |c edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo |
250 | |a 1st ed. 2022 | ||
264 | 1 | |a Singapore |b Springer Singapore |c 2022 | |
264 | 1 | |a Singapore |b Springer | |
300 | |a 1 Online-Ressource (XVII, 380 p. 148 illus., 114 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Communications in Computer and Information Science |v 1557 |x 1865-0937 | |
650 | 4 | |a Computer and Information Systems Applications | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Application software | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Computer crimes | |
700 | 1 | |a Wang, Guojun |4 edt | |
700 | 1 | |a Choo, Kim-Kwang Raymond |4 edt | |
700 | 1 | |a Ko, Ryan K. L. |4 edt | |
700 | 1 | |a Xu, Yang |4 edt | |
700 | 1 | |a Crispo, Bruno |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1904-67-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-1904-69-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-19-0468-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2022 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033257941 | ||
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FHD01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UEI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-19-0468-4 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 971215 |
---|---|
_version_ | 1806194962431213568 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Wang, Guojun Choo, Kim-Kwang Raymond Ko, Ryan K. L. Xu, Yang Crispo, Bruno |
author2_role | edt edt edt edt edt |
author2_variant | g w gw k k r c kkr kkrc r k l k rkl rklk y x yx b c bc |
author_facet | Wang, Guojun Choo, Kim-Kwang Raymond Ko, Ryan K. L. Xu, Yang Crispo, Bruno |
building | Verbundindex |
bvnumber | BV047875522 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9789811904684 (OCoLC)1304475718 (DE-599)BVBBV047875522 |
dewey-full | 005.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.3 |
dewey-search | 005.3 |
dewey-sort | 15.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-981-19-0468-4 |
edition | 1st ed. 2022 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04382nmm a2200829zcb4500</leader><controlfield tag="001">BV047875522</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220309s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811904684</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-1904-68-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-19-0468-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789811904684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1304475718</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047875522</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ubiquitous Security</subfield><subfield code="b">First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers</subfield><subfield code="c">edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Singapore</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 380 p. 148 illus., 114 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Communications in Computer and Information Science</subfield><subfield code="v">1557</subfield><subfield code="x">1865-0937</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Guojun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choo, Kim-Kwang Raymond</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ko, Ryan K. L.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xu, Yang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Crispo, Bruno</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1904-67-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-1904-69-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2022</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033257941</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UEI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-19-0468-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047875522 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:21:11Z |
indexdate | 2024-08-01T16:15:45Z |
institution | BVB |
isbn | 9789811904684 |
issn | 1865-0937 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033257941 |
oclc_num | 1304475718 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-824 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-824 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XVII, 380 p. 148 illus., 114 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2022 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer Singapore Springer |
record_format | marc |
series2 | Communications in Computer and Information Science |
spellingShingle | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers Computer and Information Systems Applications Cryptology Mobile and Network Security Computer Crime Application software Cryptography Data encryption (Computer science) Computer networks—Security measures Computer crimes |
title | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers |
title_auth | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers |
title_exact_search | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers |
title_exact_search_txtP | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers |
title_full | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo |
title_fullStr | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo |
title_full_unstemmed | Ubiquitous Security First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers edited by Guojun Wang, Kim-Kwang Raymond Choo, Ryan K. L. Ko, Yang Xu, Bruno Crispo |
title_short | Ubiquitous Security |
title_sort | ubiquitous security first international conference ubisec 2021 guangzhou china december 28 31 2021 revised selected papers |
title_sub | First International Conference, UbiSec 2021, Guangzhou, China, December 28–31, 2021, Revised Selected Papers |
topic | Computer and Information Systems Applications Cryptology Mobile and Network Security Computer Crime Application software Cryptography Data encryption (Computer science) Computer networks—Security measures Computer crimes |
topic_facet | Computer and Information Systems Applications Cryptology Mobile and Network Security Computer Crime Application software Cryptography Data encryption (Computer science) Computer networks—Security measures Computer crimes |
url | https://doi.org/10.1007/978-981-19-0468-4 |
work_keys_str_mv | AT wangguojun ubiquitoussecurityfirstinternationalconferenceubisec2021guangzhouchinadecember28312021revisedselectedpapers AT chookimkwangraymond ubiquitoussecurityfirstinternationalconferenceubisec2021guangzhouchinadecember28312021revisedselectedpapers AT koryankl ubiquitoussecurityfirstinternationalconferenceubisec2021guangzhouchinadecember28312021revisedselectedpapers AT xuyang ubiquitoussecurityfirstinternationalconferenceubisec2021guangzhouchinadecember28312021revisedselectedpapers AT crispobruno ubiquitoussecurityfirstinternationalconferenceubisec2021guangzhouchinadecember28312021revisedselectedpapers |