Information and communications security: 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture Notes in Computer Science
5927 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIV, 504 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 9783642111440 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035863607 | ||
003 | DE-604 | ||
005 | 20100809 | ||
007 | t| | ||
008 | 091207s2009 xx d||| |||| 10||| eng d | ||
015 | |a 09,N50,0035 |2 dnb | ||
016 | 7 | |a 998455814 |2 DE-101 | |
020 | |a 9783642111440 |c PB. : EUR 74.90 (freier Pr.), sfr 109.00 (freier Pr.) |9 978-3-642-11144-0 | ||
024 | 3 | |a 9783642111440 | |
028 | 5 | 2 | |a 12809325 |
035 | |a (OCoLC)471803240 | ||
035 | |a (DE-599)DNB998455814 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 |a DE-525 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 004 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information and communications security |b 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings |c Sihan Qing ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XIV, 504 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5927 | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Telecommunication systems |x Security measures |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Qing, Sihan |e Sonstige |4 oth | |
711 | 2 | |a ICICS |n 11 |d 2009 |c Peking |j Sonstige |0 (DE-588)16049345-6 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 5927 |w (DE-604)BV000000607 |9 5927 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018721402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018721402 |
Datensatz im Suchindex
_version_ | 1820875193884606465 |
---|---|
adam_text |
PAIRAT THORNCHAROENSRI, WILLY SU*ILO, AND YI MU TABLE OF CONTENTS
INVITED TALKS HOW TO STEAL A BOTNET AND WHAT CAN HAPPEN WHEN YOU DO 1
RICHARD A. KEMMERER A USER-MODE-KERNEL-MODE CO-OPERATIVE ARCHITECTURE
FOR TRUSTABLE COMPUTING 2 WENBO MAO CRYPTANALYSIS SECURITY EVALUATION OF
A DPA-RESISTANT S-BOX BASED ON THE FOURIER TRANSFORM 3 YANG LI, KAZUO
SAKIYAMA, SHINICHI KAWAMURA, YUICHI KOMANO, AND KAZUO OHTA SECURITY
ANALYSIS OF THE GF-NLFSR STRUCTURE AND FOUR-CELL BLOCK CIPHER 17 WENLING
WU, LEI ZHANG, LITING ZHANG, AND WENTAO ZHANG ALGORITHMS AND
IMPLEMENTATIONS THE RAKAPOSHI STREAM CIPHER 32 CARLOS CID, SHINSAKU
KIYOMOTO, AND JUN KURIHARA DESIGN OF RELIABLE AND SECURE MULTIPLIERS BY
MULTILINEAR ARITHMETIC CODES 47 ZHEN WANG, MARK KARPOVSKY, BERK SUNAR,
AND AJAY JOSHI HARDWARE/SOFTWARE CO-DESIGN OF PUBLIC-KEY CRYPTOGRAPHY
FOR SSL PROTOCOL EXECUTION IN EMBEDDED SYSTEMS 63 MANUEL KOSCHUCH,
JOHANN GROSSSCHAEDL, DAN PAGE, PHILIPP GRABHER, MATTHIAS HUDLER, AND
MICHAEL KRUEGER PUBLIC KEY CRYPTOGRAPHY ONLINE/OFFLINE RING SIGNATURE
SCHEME 80 JOSEPH K. LIU, MAN HO AU, WILLY SU*ILO, AND JIANYING ZHOU
POLICY-CONTROLLED SIGNATURES 91 BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/998455814 DIGITALISIERT DURCH XII TABLE OF CONTENTS
PUBLIC KEY ENCRYPTION WITHOUT RANDOM ORACLE MADE TRULY PRACTICAL 107
PUWEN WEI, XIAOYUN WANG, AND YULIANG ZHENG A PUBLIC-KEY TRAITOR TRACING
SCHEME WITH AN OPTIMAL TRANSMISSION RATE 121 YI-RUEI CHEN AND WEN-GUEY
TZENG SECURITY APPLICATIONS COMPUTATIONALLY SECURE HIERARCHICAL
SELF-HEALING KEY DISTRIBUTION FOR HETEROGENEOUS WIRELESS SENSOR NETWORKS
135 YANJIANG YANG, JIANYING ZHOU, ROBERT H. DENG, AND FENG BAO ENABLING
SECURE SECRET UPDATING FOR UNIDIRECTIONAL KEY DISTRIBUTION IN
RFID-ENABLED SUPPLY CHAINS 150 SHAOYING CAI, TIEYAN LI, CHANGSHE MA,
YINGJIU LI, AND ROBERT H. DENG BIOMETRIC-BASED NON-TRANSFERABLE
ANONYMOUS CREDENTIALS 165 MARINA BLANTON AND WILLIAM M.P. HUDELSON
SOFTWARE SECURITY SECURE REMOTE EXECUTION OF SEQUENTIAL COMPUTATIONS 181
GHASSAN O. KARAME, MARIO STRASSER, AND SRDJAN *APKUN ARCHITECTURE- AND
OS-INDEPENDENT BINARY-LEVEL DYNAMIC TEST GENERATION 198 GEN LI, KAI LU,
YING ZHANG, XICHENG LU, AND WEI ZHANG SYSTEM SECURITY MEASURING
INFORMATION FLOW IN REACTIVE PROCESSES 211 CHUNYAN MU TRUSTED ISOLATION
ENVIRONMENT: AN ATTESTATION ARCHITECTURE WITH USAGE CONTROL MODEL 226
ANBANG RUAN, QINGNI SHEN, LIANG GU, LI WANG, LEI SHI, YAHUI YANG, AND
ZHONG CHEN DENIAL-OF-SERVIC TABLE OF CONTENTS XIII DETERMINISTIC FINITE
AUTOMATA CHARACTERIZATION FOR MEMORY-BASED PATTERN MATCHING 268 LUCAS
VESPA AND NING WENG A LOSS BASED ON-LINE DETECTION OF ABNORMAL TRAFFIC
USING DYNAMIC DETECTION THRESHOLD 283 ZHENGMIN XIA, SONGNIAN LU, JIANHUA
LI, AND AIXIN ZHANG USER-ASSISTED HOST-BASED DETECTION OF OUTBOUND
MALWARE TRAFFIC 293 HUIJUN XIONG, PRATEEK MALHOTRA, DEIAN STEFAN, CHEHAI
WU, AND DANFENG YAO ASSESSING SECURITY RISK TO A NETWORK USING A
STATISTICAL MODEL OF ATTACKER COMMUNITY COMPETENCE 308 TOMAS OLSSON
SHORT PAPERS I USING THE (OPEN) SOLARIS SERVICE MANAGEMENT FACILITY AS A
BUILDING BLOCK FOR SYSTEM SECURITY 325 CHRISTOPH SCHUBA INTFINDER:
AUTOMATICALLY DETECTING INTEGER BUGS IN X86 BINARY PROGRAM 336 PING
CHEN, HAO HAN, YI WANG, XIAOBIN SHEN, XINCHUN YIN, BING MAO, AND LI XIE
A COMPARATIVE STUDY OF PRIVACY MECHANISMS AND A NOVEL PRIVACY MECHANISM
346 GUNMEET SINGH AND SARBJEET SINGH DATABASE SECURITY
COLLUSION-RESISTANT PROTOCOL FOR PRIVACY-PRESERVING DISTRIBUTED
ASSOCIATION RULES MINING 359 XIN-JING GE AND JIAN-MING ZHU GUC-SECURE
JOIN OPERATOR IN DISTRIBUTED RELATIONAL DATABASE 370 YUAN TIAN AND HAO
ZHANG TRUST MANAGEMENT TSM-TRUST 503 XIV TABLE OF CONTENTS BRING
EFFICIENT CONNOTATION EXPRESSIBLE POLICIES TO TRUST MANAGEMENT 396 YAN
ZHANG, ZHENGDE ZHAI, AND DENGGUO FENG A USER TRUST-BASED COLLABORATIVE
FILTERING RECOMMENDATION ALGORITHM 411 FUZHI ZHANG, LONG BAI, AND FENG
GAO APPLIED CRYPTOGRAPHY FINGERPRINTING ATTACK ON THE TOR ANONYMITY
SYSTEM 425 YI SHI AND KANTA MATSUURA PROACTIVE VERIFIABLE LINEAR INTEGER
SECRET SHARING SCHEME 439 CHUANGUI MA AND XIAOFEI DING A MULTI-STAGE
SECRET SHARING SCHEME USING ALL-OR-NOTHING TRANSFORM APPROACH 449 MITRA
FATEMI, TARANEH EGHLIDOS, AND MOHAMMADREZA AREF DIGITAL AUDIO
WATERMARKING TECHNIQUE USING PSEUDO-ZERNIKE MOMENTS 459 XIANGYANG WANG,
TIANXIAO MA, AND PANPAN NIU SHORT PAPERS II AN IMAGE SANITIZING SCHEME
USING DIGITAL WATERMARKING 474 MASATOSHI NOGUCHI, MANABU INUMA, RIE
SHIGETOMI, AND HIDEKI IMAI ADAPTIVE AND COMPOSABLE OBLIVIOUS TRANSFER
PROTOCOLS 483 HUAFEI ZHU AND FENG BAO DISCRETE-LOG-BASED ADDITIVELY
HOMOMORPHIC ENCRYPTION AND SECURE WSN DATA AGGREGATION 493 LICHENG WANG,
LIHUA WANG, YUN PAN, ZONGHUA ZHANG, AND YIXIAN YANG AUTHOR INDEX |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035863607 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)471803240 (DE-599)DNB998455814 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035863607</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100809</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">091207s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N50,0035</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">998455814</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642111440</subfield><subfield code="c">PB. : EUR 74.90 (freier Pr.), sfr 109.00 (freier Pr.)</subfield><subfield code="9">978-3-642-11144-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642111440</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12809325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)471803240</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB998455814</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-525</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings</subfield><subfield code="c">Sihan Qing ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 504 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5927</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qing, Sihan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">11</subfield><subfield code="d">2009</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16049345-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5927</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5927</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018721402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018721402</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Peking gnd-content |
genre_facet | Konferenzschrift 2009 Peking |
id | DE-604.BV035863607 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:45Z |
institution | BVB |
institution_GND | (DE-588)16049345-6 |
isbn | 9783642111440 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018721402 |
oclc_num | 471803240 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 DE-525 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 DE-525 |
physical | XIV, 504 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings Sihan Qing ... (eds.) Berlin [u.a.] Springer 2009 XIV, 504 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 5927 Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Peking gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Qing, Sihan Sonstige oth ICICS 11 2009 Peking Sonstige (DE-588)16049345-6 oth Lecture Notes in Computer Science 5927 (DE-604)BV000000607 5927 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018721402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings Lecture Notes in Computer Science Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4293034-0 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings |
title_auth | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings |
title_exact_search | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings |
title_full | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings Sihan Qing ... (eds.) |
title_fullStr | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings Sihan Qing ... (eds.) |
title_full_unstemmed | Information and communications security 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings Sihan Qing ... (eds.) |
title_short | Information and communications security |
title_sort | information and communications security 11th international conference icics 2009 beijing china december 14 17 2009 proceedings |
title_sub | 11th International Conference, ICICS 2009, Beijing, China, December 14-17 2009 ; proceedings |
topic | Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung Authentifikation Zugriffskontrolle Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Konferenzschrift 2009 Peking |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018721402&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT qingsihan informationandcommunicationssecurity11thinternationalconferenceicics2009beijingchinadecember14172009proceedings AT icicspeking informationandcommunicationssecurity11thinternationalconferenceicics2009beijingchinadecember14172009proceedings |