Advances in information and computer security: 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5824 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 227 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 9783642048456 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035764593 | ||
003 | DE-604 | ||
005 | 20100915 | ||
007 | t| | ||
008 | 091012s2009 xx d||| |||| 10||| eng d | ||
016 | 7 | |a 997282142 |2 DE-101 | |
020 | |a 9783642048456 |c PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 978-3-642-04845-6 | ||
024 | 3 | |a 9783642048456 | |
028 | 5 | 2 | |a 12772520 |
035 | |a (OCoLC)449850195 | ||
035 | |a (DE-599)DNB997282142 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-11 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 004 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in information and computer security |b 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings |c Tsuyoshi Takagi ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XII, 227 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5824 | |
650 | 4 | |a Elektronische Unterschrift - Kongress - Toyama <2009> | |
650 | 4 | |a Kryptoanalyse - Kongress - Toyama <2009> | |
650 | 4 | |a Rechnernetz - Computersicherheit - Datensicherung - Kongress - Toyama <2009> | |
650 | 4 | |a Sicherheitsprotokoll - Kongress - Toyama <2009> | |
650 | 4 | |a Zugriffskontrolle - Authentifikation - Kongress - Toyama <2009> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 4 | |a Data encryption (Computer science) |v Congresses | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Toyama |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Takagi, Tsuyoshi |d 1969- |e Sonstige |0 (DE-588)123231809 |4 oth | |
711 | 2 | |a International Workshop on Security |n 4 |d 2009 |c Toyama |j Sonstige |0 (DE-588)16024480-8 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5824 |w (DE-604)BV000000607 |9 5824 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018624412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018624412 |
Datensatz im Suchindex
_version_ | 1820875180325470208 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
INVITED TALK THE FUTURE OF CRYPTOGRAPHIC ALGORITHMS (EXTENDED ABSTRACT)
1 BART PRENEEL
BLOCK CIPHER
BIT-FREE COLLISION: APPLICATION TO APOP ATTACK 3
LEI WANG, YU SASAKI, KAZUO SAKIYAMA, AND KAZUO OHTA
IMPOSSIBLE BOOMERANG ATTACK FOR BLOCK CIPHER STRUCTURES 22 MALI CHOY AND
HUIHUI YAP
IMPROVED DISTINGUISHING ATTACKS ON HC-256 38
GAUTHAM SEKAR AND BART PRENEEL
CRYPTOGRAPHIC PROTOCOLS
A GENERIC CONSTRUCTION OF TIMED-RELEASE ENCRYPTION WITH PRE-OPEN
CAPABILITY 53
YASUMASA NAKAI, TAKAHIRO MATSUDA, WATARU KITADA, AND KANTA MATSUURA
AN EFFICIENT IDENTITY-BASED SIGNCRYPTION SCHEME FOR MULTIPLE RECEIVERS
71
S. SHARMILA DEVA SELVI, S. SREE VIVEK, RAHUL SRINIVASAN. AND
CHANDRASEKARAN PANDU RANGAN
UNIVERSAL DESIGNATED VERIFIER SIGNATURES WITH THRESHOLD-SIGNERS 89
PAIRAT THORNCHAROENSRI, WILLY SUSILO, AND YI MU
REDUCING COMPLEXITY ASSUMPTIONS FOR OBLIVIOUS TRANSFER 110 K. Y. CHEONG
AND TAKESHI KOSHIBA
CONTENTS PROTECTION AND INTRUSION DETECTION
TAMPER-TOLERANT SOFTWARE: MODELING AND IMPLEMENTATION 125 MARIUSZ H.
JAKUBOWSKI, CHIT WEI (NICK) SAW. AND RAMARATHNAM VENKATESAN
AN ERROR-TOLERANT VARIANT OF A SHORT 2-SECURE FINGERPRINT CODE AND ITS
SECURITY EVALUATION 140
KOJI NUIDA
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/997282142
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
EFFICIENT INTRUSION DETECTION BASED ON STATIC ANALYSIS AND STACK WALKS
158
JINGYU HUA, MINGCHU LI, KOUICHI SATURAI, AND YIZHI REN
AUTHENTICATION
STRONGLY SECURE AUTHENTICATED KEY EXCHANGE WITHOUT NAXOS' APPROACH 174
MINKYU KIM, ATSUSHI FUJIOKA, AND BERKANT USTAOGLU
ID-BASED GROUP PASSWORD-AUTHENTICATED KEY EXCHANGE 192 XUN YI, RAYLIN
TSO, AND EIJI OKAMOTO
A PROPOSAL OF EFFICIENT REMOTE BIOMETRIE AUTHENTICATION PROTOCOL 212
TAIKI SAKASHITA, YOICHI SHIBATA, TAKUMI YAMAMOTO, KENTA TAKAHASHI,
WAKAHA OGATA, HIROAKI KIKUCHI, AND MASAKATSU NISHIGAKI
AUTHOR INDEX 229 |
any_adam_object | 1 |
author_GND | (DE-588)123231809 |
building | Verbundindex |
bvnumber | BV035764593 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)449850195 (DE-599)DNB997282142 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035764593</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100915</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">091012s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">997282142</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642048456</subfield><subfield code="c">PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-04845-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642048456</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12772520</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)449850195</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB997282142</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in information and computer security</subfield><subfield code="b">4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings</subfield><subfield code="c">Tsuyoshi Takagi ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 227 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5824</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Elektronische Unterschrift - Kongress - Toyama <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Toyama <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Computersicherheit - Datensicherung - Kongress - Toyama <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitsprotokoll - Kongress - Toyama <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Zugriffskontrolle - Authentifikation - Kongress - Toyama <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Toyama</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Takagi, Tsuyoshi</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)123231809</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security</subfield><subfield code="n">4</subfield><subfield code="d">2009</subfield><subfield code="c">Toyama</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16024480-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5824</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5824</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018624412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018624412</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Toyama gnd-content |
genre_facet | Konferenzschrift 2009 Toyama |
id | DE-604.BV035764593 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:32Z |
institution | BVB |
institution_GND | (DE-588)16024480-8 |
isbn | 9783642048456 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018624412 |
oclc_num | 449850195 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
physical | XII, 227 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings Tsuyoshi Takagi ... (eds.) Berlin [u.a.] Springer 2009 XII, 227 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5824 Elektronische Unterschrift - Kongress - Toyama <2009> Kryptoanalyse - Kongress - Toyama <2009> Rechnernetz - Computersicherheit - Datensicherung - Kongress - Toyama <2009> Sicherheitsprotokoll - Kongress - Toyama <2009> Zugriffskontrolle - Authentifikation - Kongress - Toyama <2009> Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Toyama gnd-content Kryptoanalyse (DE-588)4830502-9 s DE-604 Elektronische Unterschrift (DE-588)4269037-7 s Sicherheitsprotokoll (DE-588)4709127-7 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Takagi, Tsuyoshi 1969- Sonstige (DE-588)123231809 oth International Workshop on Security 4 2009 Toyama Sonstige (DE-588)16024480-8 oth Lecture notes in computer science 5824 (DE-604)BV000000607 5824 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018624412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings Lecture notes in computer science Elektronische Unterschrift - Kongress - Toyama <2009> Kryptoanalyse - Kongress - Toyama <2009> Rechnernetz - Computersicherheit - Datensicherung - Kongress - Toyama <2009> Sicherheitsprotokoll - Kongress - Toyama <2009> Zugriffskontrolle - Authentifikation - Kongress - Toyama <2009> Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4293034-0 (DE-588)4330656-1 (DE-588)4269037-7 (DE-588)1071861417 |
title | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings |
title_auth | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings |
title_exact_search | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings |
title_full | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings Tsuyoshi Takagi ... (eds.) |
title_fullStr | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings Tsuyoshi Takagi ... (eds.) |
title_full_unstemmed | Advances in information and computer security 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings Tsuyoshi Takagi ... (eds.) |
title_short | Advances in information and computer security |
title_sort | advances in information and computer security 4th international workshop on security iwsec 2009 toyama japan october 28 30 2009 proceedings |
title_sub | 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28 - 30, 2009 ; proceedings |
topic | Elektronische Unterschrift - Kongress - Toyama <2009> Kryptoanalyse - Kongress - Toyama <2009> Rechnernetz - Computersicherheit - Datensicherung - Kongress - Toyama <2009> Sicherheitsprotokoll - Kongress - Toyama <2009> Zugriffskontrolle - Authentifikation - Kongress - Toyama <2009> Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Elektronische Unterschrift - Kongress - Toyama <2009> Kryptoanalyse - Kongress - Toyama <2009> Rechnernetz - Computersicherheit - Datensicherung - Kongress - Toyama <2009> Sicherheitsprotokoll - Kongress - Toyama <2009> Zugriffskontrolle - Authentifikation - Kongress - Toyama <2009> Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Kryptoanalyse Computersicherheit Sicherheitsprotokoll Datensicherung Rechnernetz Zugriffskontrolle Authentifikation Elektronische Unterschrift Konferenzschrift 2009 Toyama |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018624412&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT takagitsuyoshi advancesininformationandcomputersecurity4thinternationalworkshoponsecurityiwsec2009toyamajapanoctober28302009proceedings AT internationalworkshoponsecuritytoyama advancesininformationandcomputersecurity4thinternationalworkshoponsecurityiwsec2009toyamajapanoctober28302009proceedings |