LEADER 01241cam a2200325 a 4500 001 991002531999707536 008 821210muuuu9999gw aa b 001 0 ger d 020 $a3786116423 035 $ab13541699-39ule_inst 040 $aDip.to Beni Culturali$bita 245 04$aDie Sarkophage mit Darstellungen aus dem Menschenleben 260 $aBerlin :$bGebr. Mann,$cc1991 300 $a186 p., 120 p. di tav. :$bill. ;$c35 cm. 440 4$aDie Antiken Sarkophagreliefs ;$v1 500 $aIn testa al front.: Deutsches Archèaologisches Institut 504 $aContiene bibliografia 505 1 $gt. 4. $tVita privata / $rbearbeitet von Rita Amedick 650 4$aSarcofagi 650 4$aRilievi antichi 650 4$aSculture antiche 700 1 $aAmedick, Rita 700 1 $aAndreae, Bernard 700 1 $aReinsberg, Carola 710 2 $aDeutsches Archäologisches Institut 907 $a.b13541699$b02-04-14$c12-06-07 912 $a991002531999707536 945 $aLe001 AR IV 209 4°$cbd. 1 t. 4$g1$i2001000162666$lle001$nDono$og$pE70.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i14486040$z12-06-07 996 $aSarkophage mit Darstellungen aus dem Menschenleben$9571458 997 $aUNISALENTO 998 $ale001$b12-06-07$cm$da $e-$fger$ggw $h4$i0 LEADER 05004nam 22008175 450 001 9910349306203321 005 20250426005450.0 010 $a3-030-29729-2 024 7 $a10.1007/978-3-030-29729-9 035 $a(CKB)4100000008959012 035 $a(DE-He213)978-3-030-29729-9 035 $a(MiAaPQ)EBC5927586 035 $a(PPN)254819265 035 $a(EXLCZ)994100000008959012 100 $a20190813d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security Workshops $eACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5?7, 2019, Proceedings /$fedited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11605 311 08$a3-030-29728-4 327 $aSiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. 330 $aThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain Security AIoTS 2019: First International Workshop on Articial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2019: First International Workshop on Cloud Security and Privacy PriDA 2019: First InternationalWorkshop on Privacy-preserving Distributed Data Analysis SiMLA 2019: First International Workshop on Security in Machine Learning and its Applications. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11605 606 $aData protection 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aMachine learning 606 $aApplication software 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aCryptology 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aMachine learning. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a005.82 676 $a005.82 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Zhou$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMajumdar$b Suryadipta$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeng$b Weizhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Lingyu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Kehuan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349306203321 996 $aApplied cryptography and network security workshops$92278657 997 $aUNINA