AI, Blockchain and Self-Sovereign Identity in Higher Education:
Gespeichert in:
Weitere Verfasser: | , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer Nature Switzerland
2023
Cham Springer |
Ausgabe: | 1st ed. 2023 |
Schriftenreihe: | Advanced Sciences and Technologies for Security Applications
|
Schlagworte: | |
Online-Zugang: | TUM01 UBM01 UBT01 UBY01 Volltext |
Beschreibung: | 1 Online-Ressource (VI, 313 p. 151 illus., 132 illus. in color) |
ISBN: | 9783031336270 |
ISSN: | 2363-9466 |
DOI: | 10.1007/978-3-031-33627-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049032825 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230704s2023 |||| o||u| ||||||eng d | ||
020 | |a 9783031336270 |c Online |9 978-3-031-33627-0 | ||
024 | 7 | |a 10.1007/978-3-031-33627-0 |2 doi | |
035 | |a (ZDB-2-PHA)9783031336270 | ||
035 | |a (OCoLC)1389180830 | ||
035 | |a (DE-599)BVBBV049032825 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-706 |a DE-703 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a PHY 000 |2 stub | ||
245 | 1 | 0 | |a AI, Blockchain and Self-Sovereign Identity in Higher Education |c edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt |
250 | |a 1st ed. 2023 | ||
264 | 1 | |a Cham |b Springer Nature Switzerland |c 2023 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (VI, 313 p. 151 illus., 132 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced Sciences and Technologies for Security Applications |x 2363-9466 | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Higher Education | |
650 | 4 | |a Data protection | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Education, Higher | |
700 | 1 | |a Jahankhani, Hamid |4 edt | |
700 | 1 | |a Jamal, Arshad |4 edt | |
700 | 1 | |a Brown, Guy |4 edt | |
700 | 1 | |a Sainidis, Eustathios |4 edt | |
700 | 1 | |a Fong, Rose |4 edt | |
700 | 1 | |a Butt, Usman J. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-33626-3 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-33628-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-33629-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-33627-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-PHA | ||
940 | 1 | |q ZDB-2-PHA_2023 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034295486 | ||
966 | e | |u https://doi.org/10.1007/978-3-031-33627-0 |l TUM01 |p ZDB-2-PHA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-33627-0 |l UBM01 |p ZDB-2-PHA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-33627-0 |l UBT01 |p ZDB-2-PHA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-33627-0 |l UBY01 |p ZDB-2-PHA |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185318758285312 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Jahankhani, Hamid Jamal, Arshad Brown, Guy Sainidis, Eustathios Fong, Rose Butt, Usman J. |
author2_role | edt edt edt edt edt edt |
author2_variant | h j hj a j aj g b gb e s es r f rf u j b uj ujb |
author_facet | Jahankhani, Hamid Jamal, Arshad Brown, Guy Sainidis, Eustathios Fong, Rose Butt, Usman J. |
building | Verbundindex |
bvnumber | BV049032825 |
classification_tum | PHY 000 |
collection | ZDB-2-PHA |
ctrlnum | (ZDB-2-PHA)9783031336270 (OCoLC)1389180830 (DE-599)BVBBV049032825 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Physik Informatik |
discipline_str_mv | Physik Informatik |
doi_str_mv | 10.1007/978-3-031-33627-0 |
edition | 1st ed. 2023 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02443nmm a2200613zcb4500</leader><controlfield tag="001">BV049032825</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230704s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031336270</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-33627-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-33627-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-PHA)9783031336270</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1389180830</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049032825</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PHY 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">AI, Blockchain and Self-Sovereign Identity in Higher Education</subfield><subfield code="c">edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer Nature Switzerland</subfield><subfield code="c">2023</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VI, 313 p. 151 illus., 132 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced Sciences and Technologies for Security Applications</subfield><subfield code="x">2363-9466</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Higher Education</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Education, Higher</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jahankhani, Hamid</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jamal, Arshad</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brown, Guy</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sainidis, Eustathios</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fong, Rose</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Butt, Usman J.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-33626-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-33628-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-33629-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-33627-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-PHA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-PHA_2023</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034295486</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-33627-0</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-33627-0</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-33627-0</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-33627-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-PHA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049032825 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:17:09Z |
indexdate | 2024-07-10T09:53:20Z |
institution | BVB |
isbn | 9783031336270 |
issn | 2363-9466 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034295486 |
oclc_num | 1389180830 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-706 DE-703 |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-706 DE-703 |
physical | 1 Online-Ressource (VI, 313 p. 151 illus., 132 illus. in color) |
psigel | ZDB-2-PHA ZDB-2-PHA_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer Nature Switzerland Springer |
record_format | marc |
series2 | Advanced Sciences and Technologies for Security Applications |
spelling | AI, Blockchain and Self-Sovereign Identity in Higher Education edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt 1st ed. 2023 Cham Springer Nature Switzerland 2023 Cham Springer 1 Online-Ressource (VI, 313 p. 151 illus., 132 illus. in color) txt rdacontent c rdamedia cr rdacarrier Advanced Sciences and Technologies for Security Applications 2363-9466 Data and Information Security Artificial Intelligence Mobile and Network Security Higher Education Data protection Artificial intelligence Computer networks—Security measures Education, Higher Jahankhani, Hamid edt Jamal, Arshad edt Brown, Guy edt Sainidis, Eustathios edt Fong, Rose edt Butt, Usman J. edt Erscheint auch als Druck-Ausgabe 978-3-031-33626-3 Erscheint auch als Druck-Ausgabe 978-3-031-33628-7 Erscheint auch als Druck-Ausgabe 978-3-031-33629-4 https://doi.org/10.1007/978-3-031-33627-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | AI, Blockchain and Self-Sovereign Identity in Higher Education Data and Information Security Artificial Intelligence Mobile and Network Security Higher Education Data protection Artificial intelligence Computer networks—Security measures Education, Higher |
title | AI, Blockchain and Self-Sovereign Identity in Higher Education |
title_auth | AI, Blockchain and Self-Sovereign Identity in Higher Education |
title_exact_search | AI, Blockchain and Self-Sovereign Identity in Higher Education |
title_exact_search_txtP | AI, Blockchain and Self-Sovereign Identity in Higher Education |
title_full | AI, Blockchain and Self-Sovereign Identity in Higher Education edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt |
title_fullStr | AI, Blockchain and Self-Sovereign Identity in Higher Education edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt |
title_full_unstemmed | AI, Blockchain and Self-Sovereign Identity in Higher Education edited by Hamid Jahankhani, Arshad Jamal, Guy Brown, Eustathios Sainidis, Rose Fong, Usman J. Butt |
title_short | AI, Blockchain and Self-Sovereign Identity in Higher Education |
title_sort | ai blockchain and self sovereign identity in higher education |
topic | Data and Information Security Artificial Intelligence Mobile and Network Security Higher Education Data protection Artificial intelligence Computer networks—Security measures Education, Higher |
topic_facet | Data and Information Security Artificial Intelligence Mobile and Network Security Higher Education Data protection Artificial intelligence Computer networks—Security measures Education, Higher |
url | https://doi.org/10.1007/978-3-031-33627-0 |
work_keys_str_mv | AT jahankhanihamid aiblockchainandselfsovereignidentityinhighereducation AT jamalarshad aiblockchainandselfsovereignidentityinhighereducation AT brownguy aiblockchainandselfsovereignidentityinhighereducation AT sainidiseustathios aiblockchainandselfsovereignidentityinhighereducation AT fongrose aiblockchainandselfsovereignidentityinhighereducation AT buttusmanj aiblockchainandselfsovereignidentityinhighereducation |