Computer Security. ESORICS 2023 International Workshops: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II
Gespeichert in:
Weitere Verfasser: | , , , , , , , , , , , , , , , , , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer Nature Switzerland
2024
Cham Springer |
Ausgabe: | 1st ed. 2024 |
Schriftenreihe: | Lecture Notes in Computer Science
14399 |
Schlagworte: | |
Online-Zugang: | BFB01 BTU01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UEI01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (XV, 776 p. 192 illus., 150 illus. in color) |
ISBN: | 9783031541292 |
ISSN: | 1611-3349 |
DOI: | 10.1007/978-3-031-54129-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049640261 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 240409s2024 |||| o||u| ||||||eng d | ||
020 | |a 9783031541292 |c Online |9 978-3-031-54129-2 | ||
024 | 7 | |a 10.1007/978-3-031-54129-2 |2 doi | |
035 | |a (ZDB-2-SCS)9783031541292 | ||
035 | |a (ZDB-2-LNC)9783031541292 | ||
035 | |a (DE-599)BVBBV049640261 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-91 |a DE-19 |a DE-83 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-355 |a DE-824 |a DE-522 |a DE-384 |a DE-M347 |a DE-573 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Computer Security. ESORICS 2023 International Workshops |b CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II |c edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai |
250 | |a 1st ed. 2024 | ||
264 | 1 | |a Cham |b Springer Nature Switzerland |c 2024 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XV, 776 p. 192 illus., 150 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Computer Science |v 14399 |x 1611-3349 | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Computer Engineering and Networks | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Data protection | |
700 | 1 | |a Katsikas, Sokratis |4 edt | |
700 | 1 | |a Abie, Habtamu |4 edt | |
700 | 1 | |a Ranise, Silvio |4 edt | |
700 | 1 | |a Verderame, Luca |4 edt | |
700 | 1 | |a Cambiaso, Enrico |4 edt | |
700 | 1 | |a Ugarelli, Rita |4 edt | |
700 | 1 | |a Praça, Isabel |4 edt | |
700 | 1 | |a Li, Wenjuan |4 edt | |
700 | 1 | |a Meng, Weizhi |4 edt | |
700 | 1 | |a Furnell, Steven |4 edt | |
700 | 1 | |a Katt, Basel |4 edt | |
700 | 1 | |a Pirbhulal, Sandeep |4 edt | |
700 | 1 | |a Shukla, Ankur |4 edt | |
700 | 1 | |a Ianni, Michele |4 edt | |
700 | 1 | |a Dalla Preda, Mila |4 edt | |
700 | 1 | |a Choo, Kim-Kwang Raymond |4 edt | |
700 | 1 | |a Pupo Correia, Miguel |4 edt | |
700 | 1 | |a Abhishta, Abhishta |4 edt | |
700 | 1 | |a Sileno, Giovanni |4 edt | |
700 | 1 | |a Alishahi, Mina |4 edt | |
700 | 1 | |a Kalutarage, Harsha |4 edt | |
700 | 1 | |a Yanai, Naoto |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-54128-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-54130-8 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-54129-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2024 | |
940 | 1 | |q ZDB-2-LNC_2024 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034983890 | ||
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l BFB01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FHD01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FLA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FWS01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l FWS02 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l HTW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l TUM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UEI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-54129-2 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1069404 |
---|---|
_version_ | 1806175650119155712 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Katsikas, Sokratis Abie, Habtamu Ranise, Silvio Verderame, Luca Cambiaso, Enrico Ugarelli, Rita Praça, Isabel Li, Wenjuan Meng, Weizhi Furnell, Steven Katt, Basel Pirbhulal, Sandeep Shukla, Ankur Ianni, Michele Dalla Preda, Mila Choo, Kim-Kwang Raymond Pupo Correia, Miguel Abhishta, Abhishta Sileno, Giovanni Alishahi, Mina Kalutarage, Harsha Yanai, Naoto |
author2_role | edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt edt |
author2_variant | s k sk h a ha s r sr l v lv e c ec r u ru i p ip w l wl w m wm s f sf b k bk s p sp a s as m i mi p m d pm pmd k k r c kkr kkrc c m p cm cmp a a aa g s gs m a ma h k hk n y ny |
author_facet | Katsikas, Sokratis Abie, Habtamu Ranise, Silvio Verderame, Luca Cambiaso, Enrico Ugarelli, Rita Praça, Isabel Li, Wenjuan Meng, Weizhi Furnell, Steven Katt, Basel Pirbhulal, Sandeep Shukla, Ankur Ianni, Michele Dalla Preda, Mila Choo, Kim-Kwang Raymond Pupo Correia, Miguel Abhishta, Abhishta Sileno, Giovanni Alishahi, Mina Kalutarage, Harsha Yanai, Naoto |
building | Verbundindex |
bvnumber | BV049640261 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783031541292 (ZDB-2-LNC)9783031541292 (DE-599)BVBBV049640261 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-031-54129-2 |
edition | 1st ed. 2024 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05757nmm a2201117zcb4500</leader><controlfield tag="001">BV049640261</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240409s2024 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031541292</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-54129-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-54129-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031541292</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783031541292</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049640261</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Security. ESORICS 2023 International Workshops</subfield><subfield code="b">CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II</subfield><subfield code="c">edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer Nature Switzerland</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 776 p. 192 illus., 150 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">14399</subfield><subfield code="x">1611-3349</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Engineering and Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsikas, Sokratis</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abie, Habtamu</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ranise, Silvio</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Verderame, Luca</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cambiaso, Enrico</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ugarelli, Rita</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Praça, Isabel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Wenjuan</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meng, Weizhi</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katt, Basel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pirbhulal, Sandeep</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shukla, Ankur</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ianni, Michele</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dalla Preda, Mila</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choo, Kim-Kwang Raymond</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pupo Correia, Miguel</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abhishta, Abhishta</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sileno, Giovanni</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alishahi, Mina</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalutarage, Harsha</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yanai, Naoto</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-54128-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-54130-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2024</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2024</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034983890</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">BFB01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UEI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-54129-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049640261 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:39:24Z |
indexdate | 2024-08-01T11:08:47Z |
institution | BVB |
isbn | 9783031541292 |
issn | 1611-3349 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034983890 |
open_access_boolean | |
owner | DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-83 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-824 DE-522 DE-384 DE-M347 DE-573 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-83 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-355 DE-BY-UBR DE-824 DE-522 DE-384 DE-M347 DE-573 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XV, 776 p. 192 illus., 150 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2024 ZDB-2-LNC_2024 |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Springer Nature Switzerland Springer |
record_format | marc |
series2 | Lecture Notes in Computer Science |
spellingShingle | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II Mobile and Network Security Cryptology Computing Milieux Computer Engineering and Networks Data and Information Security Computer Communication Networks Computer networks / Security measures Cryptography Data encryption (Computer science) Computers Computer engineering Computer networks Data protection |
title | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II |
title_auth | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II |
title_exact_search | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II |
title_exact_search_txtP | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II |
title_full | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai |
title_fullStr | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai |
title_full_unstemmed | Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II edited by Sokratis Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha Kalutarage, Naoto Yanai |
title_short | Computer Security. ESORICS 2023 International Workshops |
title_sort | computer security esorics 2023 international workshops cps4cip adiot secassure wasp taurin prist ai and secai the hague the netherlands september 25 29 2023 revised selected papers part ii |
title_sub | CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II |
topic | Mobile and Network Security Cryptology Computing Milieux Computer Engineering and Networks Data and Information Security Computer Communication Networks Computer networks / Security measures Cryptography Data encryption (Computer science) Computers Computer engineering Computer networks Data protection |
topic_facet | Mobile and Network Security Cryptology Computing Milieux Computer Engineering and Networks Data and Information Security Computer Communication Networks Computer networks / Security measures Cryptography Data encryption (Computer science) Computers Computer engineering Computer networks Data protection |
url | https://doi.org/10.1007/978-3-031-54129-2 |
work_keys_str_mv | AT katsikassokratis computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT abiehabtamu computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT ranisesilvio computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT verderameluca computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT cambiasoenrico computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT ugarellirita computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT pracaisabel computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT liwenjuan computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT mengweizhi computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT furnellsteven computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT kattbasel computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT pirbhulalsandeep computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT shuklaankur computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT iannimichele computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT dallapredamila computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT chookimkwangraymond computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT pupocorreiamiguel computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT abhishtaabhishta computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT silenogiovanni computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT alishahimina computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT kalutarageharsha computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii AT yanainaoto computersecurityesorics2023internationalworkshopscps4cipadiotsecassurewasptaurinpristaiandsecaithehaguethenetherlandsseptember25292023revisedselectedpaperspartii |