000 | 03256nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-030-81242-3 | ||
003 | DE-He213 | ||
005 | 20240423125443.0 | ||
007 | cr nn 008mamaa | ||
008 | 210714s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030812423 _9978-3-030-81242-3 |
||
024 | 7 |
_a10.1007/978-3-030-81242-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData and Applications Security and Privacy XXXV _h[electronic resource] : _b35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19–20, 2021, Proceedings / _cedited by Ken Barker, Kambiz Ghazinour. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXI, 408 p. 128 illus., 73 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v12840 |
|
505 | 0 | _aDifferential Privacy -- Cryptology I -- Cryptology II -- Machine Learning -- Potpourri I -- Potpourri II -- Access Control. | |
520 | _aThis book constitutes the refereed proceedings of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2021, held in Calgary, Canada, in July 2021.* The 15 full papers and 8 short papers presented were carefully reviewed and selected from 45 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named differential privacy, cryptology, machine learning, access control and others. *The conference was held virtually due to the COVID-19 pandemic. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aData mining. | |
650 | 0 | _aMachine learning. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Mining and Knowledge Discovery. |
650 | 2 | 4 | _aMachine Learning. |
700 | 1 |
_aBarker, Ken. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGhazinour, Kambiz. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030812416 |
776 | 0 | 8 |
_iPrinted edition: _z9783030812430 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v12840 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-81242-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c178098 _d178098 |