Applied cryptography and network security workshops: ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , , , , , , , , , , , , , , , , , |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2023]
|
Schriftenreihe: | Lecture notes in computer science
13907 |
Schlagworte: | |
Beschreibung: | xiii, 729 Seiten Illustrationen, Diagramme |
ISBN: | 9783031411809 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV049451304 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 231204s2023 a||| |||| 10||| eng d | ||
020 | |a 9783031411809 |9 978-3-031-41180-9 | ||
035 | |a (OCoLC)1414559125 | ||
035 | |a (DE-599)BVBBV049451304 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
111 | 2 | |a ACNS |n 21. |d 2023 |c Kyōto |j Verfasser |0 (DE-588)1293200212 |4 aut | |
245 | 1 | 0 | |a Applied cryptography and network security workshops |b ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings |c Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich, editors |
264 | 1 | |a Cham |b Springer |c [2023] | |
264 | 4 | |c © 2023 | |
300 | |a xiii, 729 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 13907 | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Computer Engineering and Networks | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Computers | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks / Security measures | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2023 |z Kyōto |2 gnd-content | |
700 | 1 | |a Zhou, Jianying |4 edt | |
700 | 1 | |a Batina, Lejla |0 (DE-588)1060230399 |4 edt | |
700 | 1 | |a Li, Zengpeng |4 edt | |
700 | 1 | |a Lin, Jingqiang |4 edt | |
700 | 1 | |a Losiouk, Eleonora |4 edt | |
700 | 1 | |a Majumdar, Suryadipta |0 (DE-588)1206896256 |4 edt | |
700 | 1 | |a Mashima, Daisuke |4 edt | |
700 | 1 | |a Meng, Weizhi |d 1986- |0 (DE-588)1202716857 |4 edt | |
700 | 1 | |a Picek, Stjepan |4 edt | |
700 | 1 | |a Rahman, Mohammad Ashiqur |0 (DE-588)1107032407 |4 edt | |
700 | 1 | |a Shao, Jun |4 edt | |
700 | 1 | |a Shimaoka, Masaki |4 edt | |
700 | 1 | |a Soremekun, Ezekiel |4 edt | |
700 | 1 | |a Su, Chunhua |4 edt | |
700 | 1 | |a Teh, Je Sen |4 edt | |
700 | 1 | |a Udovenko, Aleksei |4 edt | |
700 | 1 | |a Wang, Cong |4 edt | |
700 | 1 | |a Zhang, Leo |4 edt | |
700 | 1 | |a Zhauniarovich, Yury |4 edt | |
711 | 2 | |a ADSC |n 1. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1309978948 |4 oth | |
711 | 2 | |a AIBlock |n 5. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)130997912X |4 oth | |
711 | 2 | |a AIHWS |n 4. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1312108754 |4 oth | |
711 | 2 | |a Workshop on Artificial Intelligence and Industrial IoT Security |n 5. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1312108851 |4 oth | |
711 | 2 | |a CIMSS |n 3. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1312108940 |4 oth | |
711 | 2 | |a Cloud S&P |n 5. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1312109084 |4 oth | |
711 | 2 | |a Workshop on Secure Cryptographic Implementation |n 4. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1312109475 |4 oth | |
711 | 2 | |a Workshop on Security in Mobile Technologies |n 4. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)1312109181 |4 oth | |
711 | 2 | |a Workshop on Security in Machine Learning and its Applications |n 5. |d 2023 |c Kyōto |j Sonstige |0 (DE-588)131210936X |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-41181-6 |
830 | 0 | |a Lecture notes in computer science |v 13907 |w (DE-604)BV000000607 |9 13907 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034797177 |
Datensatz im Suchindex
_version_ | 1804186216454684672 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Zhou, Jianying Batina, Lejla Li, Zengpeng Lin, Jingqiang Losiouk, Eleonora Majumdar, Suryadipta Mashima, Daisuke Meng, Weizhi 1986- Picek, Stjepan Rahman, Mohammad Ashiqur Shao, Jun Shimaoka, Masaki Soremekun, Ezekiel Su, Chunhua Teh, Je Sen Udovenko, Aleksei Wang, Cong Zhang, Leo Zhauniarovich, Yury |
author2_role | edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt |
author2_variant | j z jz l b lb z l zl j l jl e l el s m sm d m dm w m wm s p sp m a r ma mar j s js m s ms e s es c s cs j s t js jst a u au c w cw l z lz y z yz |
author_GND | (DE-588)1060230399 (DE-588)1206896256 (DE-588)1202716857 (DE-588)1107032407 |
author_corporate | ACNS Kyōto |
author_corporate_role | aut |
author_facet | Zhou, Jianying Batina, Lejla Li, Zengpeng Lin, Jingqiang Losiouk, Eleonora Majumdar, Suryadipta Mashima, Daisuke Meng, Weizhi 1986- Picek, Stjepan Rahman, Mohammad Ashiqur Shao, Jun Shimaoka, Masaki Soremekun, Ezekiel Su, Chunhua Teh, Je Sen Udovenko, Aleksei Wang, Cong Zhang, Leo Zhauniarovich, Yury ACNS Kyōto |
author_sort | ACNS Kyōto |
building | Verbundindex |
bvnumber | BV049451304 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
ctrlnum | (OCoLC)1414559125 (DE-599)BVBBV049451304 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03737nam a2200829zcb4500</leader><controlfield tag="001">BV049451304</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">231204s2023 a||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031411809</subfield><subfield code="9">978-3-031-41180-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1414559125</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049451304</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ACNS</subfield><subfield code="n">21.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1293200212</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied cryptography and network security workshops</subfield><subfield code="b">ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings</subfield><subfield code="c">Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 729 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13907</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2023</subfield><subfield code="z">Kyōto</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Batina, Lejla</subfield><subfield code="0">(DE-588)1060230399</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Zengpeng</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lin, Jingqiang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Losiouk, Eleonora</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Majumdar, Suryadipta</subfield><subfield code="0">(DE-588)1206896256</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mashima, Daisuke</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meng, Weizhi</subfield><subfield code="d">1986-</subfield><subfield code="0">(DE-588)1202716857</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Picek, Stjepan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rahman, Mohammad Ashiqur</subfield><subfield code="0">(DE-588)1107032407</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shao, Jun</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shimaoka, Masaki</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Soremekun, Ezekiel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Su, Chunhua</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Teh, Je Sen</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Udovenko, Aleksei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cong</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Leo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhauniarovich, Yury</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ADSC</subfield><subfield code="n">1.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1309978948</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">AIBlock</subfield><subfield code="n">5.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)130997912X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">AIHWS</subfield><subfield code="n">4.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1312108754</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Workshop on Artificial Intelligence and Industrial IoT Security</subfield><subfield code="n">5.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1312108851</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CIMSS</subfield><subfield code="n">3.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1312108940</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Cloud S&P</subfield><subfield code="n">5.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1312109084</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Workshop on Secure Cryptographic Implementation</subfield><subfield code="n">4.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1312109475</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Workshop on Security in Mobile Technologies</subfield><subfield code="n">4.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1312109181</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Workshop on Security in Machine Learning and its Applications</subfield><subfield code="n">5.</subfield><subfield code="d">2023</subfield><subfield code="c">Kyōto</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)131210936X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-41181-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13907</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">13907</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034797177</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2023 Kyōto gnd-content |
genre_facet | Konferenzschrift 2023 Kyōto |
id | DE-604.BV049451304 |
illustrated | Illustrated |
index_date | 2024-07-03T23:13:05Z |
indexdate | 2024-07-10T10:07:36Z |
institution | BVB |
institution_GND | (DE-588)1293200212 (DE-588)1309978948 (DE-588)130997912X (DE-588)1312108754 (DE-588)1312108851 (DE-588)1312108940 (DE-588)1312109084 (DE-588)1312109475 (DE-588)1312109181 (DE-588)131210936X |
isbn | 9783031411809 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034797177 |
oclc_num | 1414559125 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | xiii, 729 Seiten Illustrationen, Diagramme |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ACNS 21. 2023 Kyōto Verfasser (DE-588)1293200212 aut Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich, editors Cham Springer [2023] © 2023 xiii, 729 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 13907 Data and Information Security Computer Engineering and Networks Computing Milieux Cryptology Mobile and Network Security Data protection Computer engineering Computer networks Computers Cryptography Data encryption (Computer science) Computer networks / Security measures (DE-588)1071861417 Konferenzschrift 2023 Kyōto gnd-content Zhou, Jianying edt Batina, Lejla (DE-588)1060230399 edt Li, Zengpeng edt Lin, Jingqiang edt Losiouk, Eleonora edt Majumdar, Suryadipta (DE-588)1206896256 edt Mashima, Daisuke edt Meng, Weizhi 1986- (DE-588)1202716857 edt Picek, Stjepan edt Rahman, Mohammad Ashiqur (DE-588)1107032407 edt Shao, Jun edt Shimaoka, Masaki edt Soremekun, Ezekiel edt Su, Chunhua edt Teh, Je Sen edt Udovenko, Aleksei edt Wang, Cong edt Zhang, Leo edt Zhauniarovich, Yury edt ADSC 1. 2023 Kyōto Sonstige (DE-588)1309978948 oth AIBlock 5. 2023 Kyōto Sonstige (DE-588)130997912X oth AIHWS 4. 2023 Kyōto Sonstige (DE-588)1312108754 oth Workshop on Artificial Intelligence and Industrial IoT Security 5. 2023 Kyōto Sonstige (DE-588)1312108851 oth CIMSS 3. 2023 Kyōto Sonstige (DE-588)1312108940 oth Cloud S&P 5. 2023 Kyōto Sonstige (DE-588)1312109084 oth Workshop on Secure Cryptographic Implementation 4. 2023 Kyōto Sonstige (DE-588)1312109475 oth Workshop on Security in Mobile Technologies 4. 2023 Kyōto Sonstige (DE-588)1312109181 oth Workshop on Security in Machine Learning and its Applications 5. 2023 Kyōto Sonstige (DE-588)131210936X oth Erscheint auch als Online-Ausgabe 978-3-031-41181-6 Lecture notes in computer science 13907 (DE-604)BV000000607 13907 |
spellingShingle | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings Lecture notes in computer science Data and Information Security Computer Engineering and Networks Computing Milieux Cryptology Mobile and Network Security Data protection Computer engineering Computer networks Computers Cryptography Data encryption (Computer science) Computer networks / Security measures |
subject_GND | (DE-588)1071861417 |
title | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings |
title_auth | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings |
title_exact_search | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings |
title_exact_search_txtP | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings |
title_full | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich, editors |
title_fullStr | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich, editors |
title_full_unstemmed | Applied cryptography and network security workshops ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich, editors |
title_short | Applied cryptography and network security workshops |
title_sort | applied cryptography and network security workshops acns 2023 satellite workshops adsc aiblock aihws aiots cimss cloud s p sci secmt simla kyoto japan june 19 22 2023 proceedings |
title_sub | ACNS 2023 satellite workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023 : proceedings |
topic | Data and Information Security Computer Engineering and Networks Computing Milieux Cryptology Mobile and Network Security Data protection Computer engineering Computer networks Computers Cryptography Data encryption (Computer science) Computer networks / Security measures |
topic_facet | Data and Information Security Computer Engineering and Networks Computing Milieux Cryptology Mobile and Network Security Data protection Computer engineering Computer networks Computers Cryptography Data encryption (Computer science) Computer networks / Security measures Konferenzschrift 2023 Kyōto |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT acnskyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT zhoujianying appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT batinalejla appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT lizengpeng appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT linjingqiang appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT losioukeleonora appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT majumdarsuryadipta appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT mashimadaisuke appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT mengweizhi appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT picekstjepan appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT rahmanmohammadashiqur appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT shaojun appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT shimaokamasaki appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT soremekunezekiel appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT suchunhua appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT tehjesen appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT udovenkoaleksei appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT wangcong appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT zhangleo appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT zhauniarovichyury appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT adsckyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT aiblockkyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT aihwskyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT workshoponartificialintelligenceandindustrialiotsecuritykyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT cimsskyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT cloudspkyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT workshoponsecurecryptographicimplementationkyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT workshoponsecurityinmobiletechnologieskyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings AT workshoponsecurityinmachinelearninganditsapplicationskyoto appliedcryptographyandnetworksecurityworkshopsacns2023satelliteworkshopsadscaiblockaihwsaiotscimsscloudspscisecmtsimlakyotojapanjune19222023proceedings |