Information security: 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York, NY
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5735 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 508 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783642044731 3642044735 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035724663 | ||
003 | DE-604 | ||
005 | 20091015 | ||
007 | t| | ||
008 | 090915s2009 xx ad|| |||| 10||| eng d | ||
015 | |a 09,N36,0055 |2 dnb | ||
016 | 7 | |a 995948267 |2 DE-101 | |
020 | |a 9783642044731 |c kart. : EUR 74.90 (freier Pr.), sfr 109.00 (freier Pr.) |9 978-3-642-04473-1 | ||
020 | |a 3642044735 |9 3-642-04473-5 | ||
024 | 3 | |a 9783642044731 | |
028 | 5 | 2 | |a 12761302 |
035 | |a (OCoLC)436029082 | ||
035 | |a (DE-599)DNB995948267 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-706 |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.822 | |
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Information security |b 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings |c Pierangela Samarati ... (eds.) |
264 | 1 | |a Berlin ; Heidelberg ; New York, NY |b Springer |c 2009 | |
300 | |a XIV, 508 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5735 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Computersicherheit - Datensicherung - Kongress - Pisa <2009> | |
650 | 4 | |a Eindringerkennung - Kryptoanalyse - Kongress - Pisa <2009> | |
650 | 4 | |a Kryptosystem - Zugriffskontrolle - Authentifikation - Kongress - Pisa <2009> | |
650 | 4 | |a Sicherheitsprotokoll - Kongress - Pisa <2009> | |
650 | 4 | |a Trusted Computing - Kongress - Pisa <2009> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Pisa |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 2 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 3 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 3 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Samarati, Pierangela |e Sonstige |4 oth | |
711 | 2 | |a ISC |n 12 |d 2009 |c Pisa |j Sonstige |0 (DE-588)16021506-7 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5735 |w (DE-604)BV000000607 |9 5735 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001379&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018001379 |
Datensatz im Suchindex
_version_ | 1820875171865559040 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
ANALYSIS TECHNIQUES
A NEW APPROACH TO \ 2 CRYPTANALYSIS OF BLOCK CIPHERS 1
JORGE NAKAHARA JR., GAUTHAM SEKAR, DANIEL SANTANA DE FREITAS. CHANG
CHIANN, RAMON HUGO DE SOUZA, AND BART PRENEEL
ANALYSIS AND OPTIMIZATION OF CRYPTOGRAPHICALLY GENERATED ADDRESSES 17
JOPPE W. BOS, ONUR OZEN, AND JEAN-PIERRE HUBAUX
SECURITY ANALYSIS OF THE PACE KEY-AGREEMENT PROTOCOL 33
JENS BENDER, MARC FISCHLIN, AND DENNIS KIIGLER
TOWARDS SECURITY NOTIONS FOR WHITE-BOX CRYPTOGRAPHY (SHORT PAPER) 49
AJNITABH SAXENA, BRECHT WYSEUR, AND BART, PRENEEL
A CALCULUS TO DETECT GUESSING ATTACKS (SHORT PAPER) 59
BOGDAN GROZA AND MARINS MINEA
HASH FUNCTIONS
STRUCTURAL ATTACKS ON TWO SHA-3 CANDIDATES: BLENDER-N AND DCH-RC 68
MARIO LARNBERGER AND FLORIAN MENDEL
MEET-IN-THE-MIDDLE ATTACKS USING OUTPUT TRUNCATION IN 3-PASS HAVAL 79
YU SASAKI
ON FREE-START COLLISIONS AND COLLISIONS FOR TIB3 95
FLORIAN MENDEL AND MARTIN SCHLAFFER
DATABASE SECURITY AND BIOMETRICS
DETECTION OF DATABASE INTRUSION USING A TWO-STAGE FUZZY SYSTEM 107
SUVASINI PANIGRAHI AND SHARNIK SURAL
COMBINING CONSISTENCY AND CONFIDENTIALITY REQUIREMENTS IN FIRST-ORDER
DATABASES 121
JOACHIM BISKUP AND LENA WIESE
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/995948267
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
CANCELABLE IRIS BIOMETRICS USING BLOCK RE-MAPPING AND IMAGE WARPING
(SHORT PAPER) 135
JUTTA HAEMMERLE-UHL, ELIAS PSCHERNIG, AND ANDREAS UHI
IRIS RECOGNITION IN NONIDEAL SITUATIONS (SHORT PAPER) 143 KAUSHIK ROY
AND PRABIR BHATTACHARYA
ALGEBRAIC ATTACKS AND PROXY RE-ENCRYPTION
EFFICIENT CONDITIONAL PROXY RE-ENCRYPTION WITH CHOSEN-CIPHERTEXT
SECURITY 151
JIAN WENG, YANJIANG YANG, QIANG TANG, ROBERT H. DENG, AND FENG BAO
PRACTICAL ALGEBRAIC ATTACKS ON THE HITAG2 STREAM CIPHER 167 NICOLAS T.
COURTOIS, SEAN O'NEIL, AND JEAN-JACQUES QUISQUATER
A NEW CONSTRUCTION OF BOOLEAN FUNCTIONS WITH MAXIMUM ALGEBRAIC IMMUNITY
177
DESHUAI DONG, SHAOJING FU, LONGJIANG QU, AND CHAO LI
DISTRIBUTED SYSTEM SECURITY
A 2 M: ACCESS-ASSURED MOBILE DESKTOP COMPUTING 186
ANGELOS STAVROU, RICARDO A. BARRATO, ANGELOS D. KEROMYTIS, AND JASON
NIEH AUTOMATED SPYWARE COLLECTION AND ANALYSIS 202
ANDREAS STAMMINGER, CHRISTOPHER KRUEGEL, GIOVANNI VIGNA, AND ENGIN KIRDA
TOWARDS UNIFYING VULNERABILITY INFORMATION FOR ATTACK GRAPH CONSTRUCTION
218
SEBASTIAN ROSCHKE, FENG CHENG, ROBERT SCHUPPENIES, AND CHRISTOPH MEINEL
TRAITOR TRACING WITHOUT A PRIORI BOUND ON THE COALITION SIZE (SHORT
PAPER) 234
HONGXIA JIN AND SERDAR PEHLIVANOGLU
SISR - A NEW MODEL FOR EPIDEMIC SPREADING OF ELECTRONIC THREATS (SHORT
PAPER) 242
BORIS ROZENBERG, EHUD GUDES, AND YUVAL ELOVICI
IDENTITY MANAGEMENT AND AUTHENTICATION
AN EFFICIENT DISTANCE BOUNDING RFID AUTHENTICATION PROTOCOL: BALANCING
FALSE-ACCEPTANCE RATE AND MEMORY REQUIREMENT 250 GILDAS AVOINE AND ASIAN
TCHAMKERTEN
IMAGE 3
TABLE OF CONTENTS XIII
ROBUST AUTHENTICATION USING PHYSICALLY UNCLONABLE FUNCTIONS 262 KEITH B.
FRIKKEN, MARINA BLANTON, AND MIKHAIL J. ATALLAH
RISKS OF THE CARDSPACE PROTOCOL 278
SEBASTIAN GAJEK, JOERG SCHWENK, MICHAEL STEINER, AND CHEN XUAN
APPLIED CRYPTOGRAPHY
FAIR E-CASH: BE COMPACT, SPEND FASTER 294
SEBASTIEN CANARD, CECILE DELERABLEE, ALINE GOUGET, EMELINE HUFSCHMITT,
FABIEN LAGUILLAUMIE, HERVE SIBERT, JACQUES TRAORE, AND DAMIEN VERGNAUD
ON THE SECURITY OF IDENTITY BASED RING SIGNCRYPTION SCHEMES 310 5.
SHARMILA DEVA SELVI, S. SREE VIVEK, AND C. PANDU RANGAN
A STORAGE EFFICIENT REDACTABLE SIGNATURE IN THE STANDARD MODEL 326 RYO
NOJIMA, JIN TAMURA, YOUKI KADOBAYASHI, AND HIROAKI KIKUCHI
GENERIC CONSTRUCTION OF STATEFUL IDENTITY BASED ENCRYPTION (SHORT PAPER)
338
PENG YANG, RUI ZHANG, KANTA MATSUURA, AND HIDEKI IRNAI
ACCESS CONTROL
PRIVACY-AWARE ATTRIBUTE-BASED ENCRYPTION WITH USER ACCOUNTABILITY . .
347 JIN LI, KUI REN, BO ZHU, AND ZHIGUO WAN
HARDWARE-ASSISTED APPLICATION-LEVEL ACCESS CONTROL 363
YU-YUAN CHEN AND RUBY B. LEE
TOWARDS TRUSTWORTHY DELEGATION IN ROLE-BASED ACCESS CONTROL MODEL 379
MANACHAI TOAHCHOODEE, XING XIE, AND INDRAKSHI RAY
SECURE INTEROPERATION IN MULTIDOMAIN ENVIRONMENTS EMPLOYING UCON
POLICIES (SHORT PAPER) 395
JIANFENG LU, RUIXUAN LI, VIJAY VARADHARAJAN. ZHE.NGDING LU. AND XIAOPU
MA
SPECIFICATION AND ENFORCEMENT OF STATIC SEPARATION-OF-DUTY POLICIES IN
USAGE CONTROL (SHORT PAPER) 403
JIANFENG LU, RUIXUAN LI, ZHENGDING LU. JINIVEI HU, AND XIAOPU MA
MAC AND NONCES
NONCE GENERATORS AND THE NONCE RESET PROBLEM 411
ERIK ZENNER
IMAGE 4
XIV TABLE OF CONTENTS
MAC PRECOMPUTATION WITH APPLICATIONS TO SECURE MEMORY 427 JUAN GARAY,
VLADIMIR KOLESNIKOV, AND RAE MCLELLAN
HMAC WITHOUT THE "SECOND" KEY 443
KAN YASUDA
P2P AND WEB SERVICES
ADDING TRUST TO P2P DISTRIBUTION OF PAID CONTENT 459
ALEX SHERMAN, ANGELOS STAVROU, JASON NIEH, ANGELOS D. KEROMYTIS, AND
CLIFF STEIN
PEER-TO-PEER ARCHITECTURE FOR COLLABORATIVE INTRUSION AND MALWARE
DETECTION ON A LARGE SCALE 475
MIRCO MARCHETTI, MICHELE MESSORI, AND MICHELE COLAJANNI
F3ILDCRYPT: END-TO-END PROTECTION OF SENSITIVE INFORMATION IN WEB
SERVICES 491
MATTHEW BURNSIDE AND ANGELOS D. KEROMYTIS
AUTHOR INDEX 507 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035724663 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)436029082 (DE-599)DNB995948267 |
dewey-full | 005.822 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.822 005.8 |
dewey-search | 005.822 005.8 |
dewey-sort | 15.822 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035724663</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091015</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090915s2009 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N36,0055</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">995948267</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642044731</subfield><subfield code="c">kart. : EUR 74.90 (freier Pr.), sfr 109.00 (freier Pr.)</subfield><subfield code="9">978-3-642-04473-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642044735</subfield><subfield code="9">3-642-04473-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642044731</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12761302</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)436029082</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB995948267</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.822</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings</subfield><subfield code="c">Pierangela Samarati ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 508 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5735</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Datensicherung - Kongress - Pisa <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Eindringerkennung - Kryptoanalyse - Kongress - Pisa <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptosystem - Zugriffskontrolle - Authentifikation - Kongress - Pisa <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitsprotokoll - Kongress - Pisa <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Trusted Computing - Kongress - Pisa <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Pisa</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Samarati, Pierangela</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISC</subfield><subfield code="n">12</subfield><subfield code="d">2009</subfield><subfield code="c">Pisa</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16021506-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5735</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5735</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001379&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018001379</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Pisa gnd-content |
genre_facet | Konferenzschrift 2009 Pisa |
id | DE-604.BV035724663 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:24Z |
institution | BVB |
institution_GND | (DE-588)16021506-7 |
isbn | 9783642044731 3642044735 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018001379 |
oclc_num | 436029082 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 DE-83 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-706 DE-83 DE-11 |
physical | XIV, 508 S. Ill., graph. Darst. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings Pierangela Samarati ... (eds.) Berlin ; Heidelberg ; New York, NY Springer 2009 XIV, 508 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5735 Literaturangaben Computersicherheit - Datensicherung - Kongress - Pisa <2009> Eindringerkennung - Kryptoanalyse - Kongress - Pisa <2009> Kryptosystem - Zugriffskontrolle - Authentifikation - Kongress - Pisa <2009> Sicherheitsprotokoll - Kongress - Pisa <2009> Trusted Computing - Kongress - Pisa <2009> Computer security Congresses Computers Access control Congresses Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Pisa gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Trusted Computing (DE-588)7562931-8 s Eindringerkennung (DE-588)4706627-1 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Sicherheitsprotokoll (DE-588)4709127-7 s Samarati, Pierangela Sonstige oth ISC 12 2009 Pisa Sonstige (DE-588)16021506-7 oth Lecture notes in computer science 5735 (DE-604)BV000000607 5735 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001379&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings Lecture notes in computer science Computersicherheit - Datensicherung - Kongress - Pisa <2009> Eindringerkennung - Kryptoanalyse - Kongress - Pisa <2009> Kryptosystem - Zugriffskontrolle - Authentifikation - Kongress - Pisa <2009> Sicherheitsprotokoll - Kongress - Pisa <2009> Trusted Computing - Kongress - Pisa <2009> Computer security Congresses Computers Access control Congresses Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4330656-1 (DE-588)7562931-8 (DE-588)1071861417 |
title | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings |
title_auth | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings |
title_exact_search | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings |
title_full | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings Pierangela Samarati ... (eds.) |
title_fullStr | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings Pierangela Samarati ... (eds.) |
title_full_unstemmed | Information security 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings Pierangela Samarati ... (eds.) |
title_short | Information security |
title_sort | information security 12th international conference isc 2009 pisa italy september 7 9 2009 proceedings |
title_sub | 12th international conference, ISC 2009 Pisa, Italy, September 7 - 9, 2009 ; proceedings |
topic | Computersicherheit - Datensicherung - Kongress - Pisa <2009> Eindringerkennung - Kryptoanalyse - Kongress - Pisa <2009> Kryptosystem - Zugriffskontrolle - Authentifikation - Kongress - Pisa <2009> Sicherheitsprotokoll - Kongress - Pisa <2009> Trusted Computing - Kongress - Pisa <2009> Computer security Congresses Computers Access control Congresses Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Computersicherheit - Datensicherung - Kongress - Pisa <2009> Eindringerkennung - Kryptoanalyse - Kongress - Pisa <2009> Kryptosystem - Zugriffskontrolle - Authentifikation - Kongress - Pisa <2009> Sicherheitsprotokoll - Kongress - Pisa <2009> Trusted Computing - Kongress - Pisa <2009> Computer security Congresses Computers Access control Congresses Kryptosystem Kryptoanalyse Eindringerkennung Computersicherheit Sicherheitsprotokoll Datensicherung Zugriffskontrolle Authentifikation Trusted Computing Konferenzschrift 2009 Pisa |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001379&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT samaratipierangela informationsecurity12thinternationalconferenceisc2009pisaitalyseptember792009proceedings AT iscpisa informationsecurity12thinternationalconferenceisc2009pisaitalyseptember792009proceedings |