Information and Communications Security: 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore
Springer Nature Singapore
2025
Singapore Springer |
Ausgabe: | 1st ed. 2025 |
Schriftenreihe: | Lecture Notes in Computer Science
15057 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-634 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-898 DE-859 DE-861 DE-863 DE-862 DE-523 DE-91 DE-384 DE-473 DE-19 DE-355 DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 Volltext |
Beschreibung: | 1 Online-Ressource (XVI, 334 p. 86 illus., 50 illus. in color) |
ISBN: | 9789819788019 |
ISSN: | 1611-3349 |
DOI: | 10.1007/978-981-97-8801-9 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV050116671 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 250113s2025 xx o|||| 00||| eng d | ||
020 | |a 9789819788019 |c Online |9 978-981-9788-01-9 | ||
024 | 7 | |a 10.1007/978-981-97-8801-9 |2 doi | |
035 | |a (ZDB-2-SCS)9789819788019 | ||
035 | |a (ZDB-2-LNC)9789819788019 | ||
035 | |a (DE-599)BVBBV050116671 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M347 |a DE-355 |a DE-863 |a DE-824 |a DE-92 |a DE-19 |a DE-703 |a DE-384 |a DE-862 |a DE-473 |a DE-861 |a DE-706 |a DE-523 |a DE-573 |a DE-634 |a DE-859 |a DE-91 |a DE-522 |a DE-Aug4 |a DE-898 |a DE-29 |a DE-20 |a DE-739 |a DE-1050 | ||
082 | 0 | |a 005.73 |2 23 | |
082 | 0 | |a 003.54 |2 23 | |
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Information and Communications Security |b 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II |c edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
250 | |a 1st ed. 2025 | ||
264 | 1 | |a Singapore |b Springer Nature Singapore |c 2025 | |
264 | 1 | |a Singapore |b Springer | |
300 | |a 1 Online-Ressource (XVI, 334 p. 86 illus., 50 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Computer Science |v 15057 |x 1611-3349 | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Database Management | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Computer and Information Systems Applications | |
650 | 4 | |a Computer Imaging, Vision, Pattern Recognition and Graphics | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Information theory | |
650 | 4 | |a Database management | |
650 | 4 | |a Data mining | |
650 | 4 | |a Application software | |
650 | 4 | |a Image processing / Digital techniques | |
650 | 4 | |a Computer vision | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
700 | 1 | |a Katsikas, Sokratis |4 edt | |
700 | 1 | |a Xenakis, Christos |4 edt | |
700 | 1 | |a Kalloniatis, Christos |4 edt | |
700 | 1 | |a Lambrinoudakis, Costas |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9788-00-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-981-9788-02-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-981-97-8801-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2025 | |
940 | 1 | |q ZDB-2-LNC_2025 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035453578 | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-522 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-1050 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-573 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-863 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-862 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-523 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-91 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-355 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-824 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-981-97-8801-9 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1821191585819262976 |
---|---|
adam_text | |
any_adam_object | |
author2 | Katsikas, Sokratis Xenakis, Christos Kalloniatis, Christos Lambrinoudakis, Costas |
author2_role | edt edt edt edt |
author2_variant | s k sk c x cx c k ck c l cl |
author_facet | Katsikas, Sokratis Xenakis, Christos Kalloniatis, Christos Lambrinoudakis, Costas |
building | Verbundindex |
bvnumber | BV050116671 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9789819788019 (ZDB-2-LNC)9789819788019 (DE-599)BVBBV050116671 |
dewey-full | 005.73 003.54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security 003 - Systems |
dewey-raw | 005.73 003.54 |
dewey-search | 005.73 003.54 |
dewey-sort | 15.73 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-981-97-8801-9 |
edition | 1st ed. 2025 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV050116671</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250113s2025 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789819788019</subfield><subfield code="c">Online</subfield><subfield code="9">978-981-9788-01-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-981-97-8801-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9789819788019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9789819788019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050116671</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.73</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">003.54</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and Communications Security</subfield><subfield code="b">26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II</subfield><subfield code="c">edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2025</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer Nature Singapore</subfield><subfield code="c">2025</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 334 p. 86 illus., 50 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">15057</subfield><subfield code="x">1611-3349</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Imaging, Vision, Pattern Recognition and Graphics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image processing / Digital techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer vision</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katsikas, Sokratis</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Xenakis, Christos</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kalloniatis, Christos</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lambrinoudakis, Costas</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9788-00-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-981-9788-02-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2025</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2025</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035453578</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-981-97-8801-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050116671 |
illustrated | Not Illustrated |
indexdate | 2025-01-14T04:00:40Z |
institution | BVB |
isbn | 9789819788019 |
issn | 1611-3349 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035453578 |
open_access_boolean | |
owner | DE-M347 DE-355 DE-BY-UBR DE-863 DE-BY-FWS DE-824 DE-92 DE-19 DE-BY-UBM DE-703 DE-384 DE-862 DE-BY-FWS DE-473 DE-BY-UBG DE-861 DE-706 DE-523 DE-573 DE-634 DE-859 DE-91 DE-BY-TUM DE-522 DE-Aug4 DE-898 DE-BY-UBR DE-29 DE-20 DE-739 DE-1050 |
owner_facet | DE-M347 DE-355 DE-BY-UBR DE-863 DE-BY-FWS DE-824 DE-92 DE-19 DE-BY-UBM DE-703 DE-384 DE-862 DE-BY-FWS DE-473 DE-BY-UBG DE-861 DE-706 DE-523 DE-573 DE-634 DE-859 DE-91 DE-BY-TUM DE-522 DE-Aug4 DE-898 DE-BY-UBR DE-29 DE-20 DE-739 DE-1050 |
physical | 1 Online-Ressource (XVI, 334 p. 86 illus., 50 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2025 ZDB-2-LNC_2025 |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | Springer Nature Singapore Springer |
record_format | marc |
series2 | Lecture Notes in Computer Science |
spellingShingle | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology Data structures (Computer science) Information theory Database management Data mining Application software Image processing / Digital techniques Computer vision Cryptography Data encryption (Computer science) |
title | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II |
title_auth | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II |
title_exact_search | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II |
title_full | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
title_fullStr | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
title_full_unstemmed | Information and Communications Security 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II edited by Sokratis Katsikas, Christos Xenakis, Christos Kalloniatis, Costas Lambrinoudakis |
title_short | Information and Communications Security |
title_sort | information and communications security 26th international conference icics 2024 mytilene greece august 26 28 2024 proceedings part ii |
title_sub | 26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II |
topic | Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology Data structures (Computer science) Information theory Database management Data mining Application software Image processing / Digital techniques Computer vision Cryptography Data encryption (Computer science) |
topic_facet | Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology Data structures (Computer science) Information theory Database management Data mining Application software Image processing / Digital techniques Computer vision Cryptography Data encryption (Computer science) |
url | https://doi.org/10.1007/978-981-97-8801-9 |
work_keys_str_mv | AT katsikassokratis informationandcommunicationssecurity26thinternationalconferenceicics2024mytilenegreeceaugust26282024proceedingspartii AT xenakischristos informationandcommunicationssecurity26thinternationalconferenceicics2024mytilenegreeceaugust26282024proceedingspartii AT kalloniatischristos informationandcommunicationssecurity26thinternationalconferenceicics2024mytilenegreeceaugust26282024proceedingspartii AT lambrinoudakiscostas informationandcommunicationssecurity26thinternationalconferenceicics2024mytilenegreeceaugust26282024proceedingspartii |