000 | 03081nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-10684-2 | ||
003 | DE-He213 | ||
005 | 20240730175458.0 | ||
007 | cr nn 008mamaa | ||
008 | 220712s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031106842 _9978-3-031-10684-2 |
||
024 | 7 |
_a10.1007/978-3-031-10684-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData and Applications Security and Privacy XXXVI _h[electronic resource] : _b36th Annual IFIP WG 11.3 Conference, DBSec 2022, Newark, NJ, USA, July 18-20, 2022, Proceedings / _cedited by Shamik Sural, Haibing Lu. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aX, 329 p. 65 illus., 55 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13383 |
|
505 | 0 | _aData Privacy -- Distributed Systems -- IoT Security -- Privacy-Preserving Access and Computation -- Quantum Security -- Security Operations and Policies. | |
520 | _aThis book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2022, held in Newark, NJ, USA, in July 2022. The 12 full papers and 6 short papers presented were carefully reviewed and selected from 33 submissions. The conference covers research in data and applications security and privacy. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aApplication software. _9116875 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9116876 |
650 | 2 | 4 |
_aDatabase Management System. _932540 |
700 | 1 |
_aSural, Shamik. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9116877 |
|
700 | 1 |
_aLu, Haibing. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9116878 |
|
710 | 2 |
_aSpringerLink (Online service) _9116879 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031106835 |
776 | 0 | 8 |
_iPrinted edition: _z9783031106859 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13383 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-10684-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89945 _d89945 |