{"entities":{"Q400557":{"pageid":402324,"ns":120,"title":"Item:Q400557","lastrevid":61608690,"modified":"2026-04-11T00:26:42Z","type":"item","id":"Q400557","labels":{"en":{"language":"en","value":"Computer security -- ESORICS 2014. 19th European symposium on research in computer security, Wroc\u0142aw, Poland, September 7--11, 2014. Proceedings, Part II"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6333752"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q400557$A8EECBB7-CCDB-48CA-8283-BDCA3CC966A9","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"4437c114d5dc7304a572d4bec50acae7c33cfc06","datavalue":{"value":{"text":"Computer security -- ESORICS 2014. 19th European symposium on research in computer security, Wroc\u0142aw, Poland, September 7--11, 2014. Proceedings, Part II","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q400557$3A31C5A6-A5D8-4A98-97CE-DEF2ABACDEDD","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"5a2a2ef9c3ffdadbee332bdacd88594c54017526","datavalue":{"value":"1477.68021","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$E2D5E31E-8922-4E44-B56C-A7A2D2355C0B","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"96e8eb17733dfd19737c0f3fc833a0b8f5362bbc","datavalue":{"value":"10.1007/978-3-319-11212-1","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$9F478306-D495-4182-8BB3-2F1964A8B670","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"85c07c7737819bff773f78e2590a3bb761fe677b","datavalue":{"value":{"entity-type":"item","numeric-id":162374,"id":"Q162374"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q400557$1130959C-CA68-4A2F-94FF-82EF1572F237","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"f7a8b27eefbcb795bf06fab270bd2ba67df604cb","datavalue":{"value":{"time":"+2014-08-22T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q400557$D71A1C52-5C75-42D0-8DFB-23308A82F6F3","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$3A266D61-1245-4D00-9F8C-34CE7418347D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"2335101d556243c88261e1fccd8d7026b2856a8a","datavalue":{"value":"68M25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$645F8BE3-6ADE-4BC5-B50A-DA1EBE1F9ADE","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"6f2c17db95e93f9a5a19ff6c68b3a1df8b0c021e","datavalue":{"value":"00B25","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$10254624-DFAE-432C-981C-887000742E72","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"69c8ce462cd51d4b474ab2569cc9d4e0f22482de","datavalue":{"value":"6333752","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$B8E706C4-01C2-4846-82D3-F111D4CB4A29","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q400557$CB78F76B-B2C4-4A74-BE50-368824F9ACEE","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"89444fd2b4002169289b6a866a846f550f708a8f","datavalue":{"value":"https://doi.org/10.1007/978-3-319-11212-1","type":"string"},"datatype":"url"},"type":"statement","id":"Q400557$0CDD2C16-676B-444D-AF94-DA28FE11BAD1","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"854aea4080c0060719506db754717462fe1083dd","datavalue":{"value":"W4213335931","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q400557$8C2A4ADA-308C-4B97-8A9B-5331F7A57A18","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Computer security -- ESORICS 2014. 19th European symposium on research in computer security, Wroc\u0142aw, Poland, September 7--11, 2014. Proceedings, Part II","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Computer_security_--_ESORICS_2014._19th_European_symposium_on_research_in_computer_security,_Wroc%C5%82aw,_Poland,_September_7--11,_2014._Proceedings,_Part_II"}}}}}