LEADER 00858nam0-22002771i-450- 001 990004254930403321 005 19990530 035 $a000425493 035 $aFED01000425493 035 $a(Aleph)000425493FED01 035 $a000425493 100 $a19990530g19709999km-y0itay50------ba 101 0 $ager 105 $ay-------001yy 200 1 $a<>Zitate aus dem Neuen Testament bei Clemens von Alexandrien$fM. Mees 210 $aRom$ctypis Pontificiae Universitatis Gregorianae$d1970 215 $aX, 267 p.$d25 cm 700 1$aMees,$bM.$0387421 702 1$aClemens Alexandrinus$f 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004254930403321 952 $aFCL 481$bIst.Fil.Cl.9522$fFLFBC 959 $aFLFBC 996 $aZitate aus dem Neuen Testament bei Clemens von Alexandrien$9480778 997 $aUNINA LEADER 03080nam 22007215 450 001 9910349434103321 005 20251225203636.0 010 $a9783319935249 010 $a3319935240 024 7 $a10.1007/978-3-319-93524-9 035 $a(CKB)3810000000358673 035 $a(DE-He213)978-3-319-93524-9 035 $a(MiAaPQ)EBC6285885 035 $a(PPN)229494447 035 $a(EXLCZ)993810000000358673 100 $a20180620d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28?29, 2017, Proceedings /$fedited by Gerhard P. Hancke, Ernesto Damiani 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XII, 189 p. 56 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10741 311 08$a9783319935232 311 08$a3319935232 320 $aIncludes bibliographical references and index. 330 $aThis volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10741 606 $aData protection 606 $aApplication software 606 $aComputers, Special purpose 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Communication Networks 606 $aCryptology 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers, Special purpose. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 615 24$aCryptology. 676 $a005.8 702 $aHancke$b Gerhard P$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDamiani$b Ernesto$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349434103321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA