Information security, practice and experience: 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6047 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 397 S. graph. Darst. 24 cm |
ISBN: | 9783642128264 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036433803 | ||
003 | DE-604 | ||
005 | 20100629 | ||
007 | t| | ||
008 | 100503s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N14 |2 dnb | ||
016 | 7 | |a 1001251946 |2 DE-101 | |
020 | |a 9783642128264 |c kart. : EUR 66.34 (freier Pr.), sfr 96.50 (freier Pr.) |9 978-3-642-12826-4 | ||
024 | 3 | |a 9783642128264 | |
028 | 5 | 2 | |a 80013469 |
035 | |a (OCoLC)637032743 | ||
035 | |a (DE-599)DNB1001251946 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Information security, practice and experience |b 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings |c Jin Kwak ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIII, 397 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6047 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Seoul |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kwak, Chin |e Sonstige |0 (DE-588)141155620 |4 oth | |
711 | 2 | |a ISPEC |n 6 |d 2010 |c Seoul |j Sonstige |0 (DE-588)16063911-6 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6047 |w (DE-604)BV000000607 |9 6047 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3450003&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020306317&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020306317 |
Datensatz im Suchindex
_version_ | 1820875228326133760 |
---|---|
adam_text |
TABLE OF CONTENTS CRYPTANALYSIS IMPROVED RELATED-KEY BOOMERANG ATTACKS
ON ROUND-REDUCED THREEFISH-512 1 JIAZHE CHEN AND KETING JIA INTEGRAL
ATTACKS ON REDUCED-ROUND ARIA BLOCK CIPHER 19 YANJUN LI, WENLING WU, AND
LEI ZHANG A NEW CLASS OF RC4 COLLIDING KEY PAIRS WITH GREATER HAMMING
DISTANCE 30 JIAGENG CHEN AND ATSUKO MIYAJI ON THE SECURITY OF NOEKEON
AGAINST SIDE CHANNEL CUBE ATTACKS 45 SHEKH FAISAL ABDUL-LATIP, MOHAMMAD
REZA REYHANITABAR, WILLY SUSILO, AND JENNIFER SEBERRY ALGORITHMS AND
IMPLEMENTATIONS (I) ON FAST AND APPROXIMATE ATTACK TREE COMPUTATIONS 56
AIVO JIIRGENSON AND JAN WILLEMSON WIDTH-3 JOINT SPARSE FORM 67 KATSUYUKI
OKEYA, HIDEHIRO KATO, AND YASUYUKI NOGAMI ACCELERATING INVERSE OF GF(2 N
) WITH PRECOMPUTATION 85 LEI XU AND DONGDAI LIN ALGORITHMS AND
IMPLEMENTATIONS (II) CONCURRENT ERROR DETECTION ARCHITECTURES FOR FIELD
MULTIPLICATION USING GAUSSIAN NORMAL BASIS 96 ZHEN WANG, XIAOZHE WANG,
AND SHUQIN FAN THE ELLIPTIC CURVE DISCRETE LOGARITHM PROBLEMS OVER THE
P-ADIC FIELD AND FORMAL GROUPS 110 MASAYA YASUDA A NEW EFFICIENT
ALGORITHM FOR COMPUTING ALL LOW DEGREE ANNIHILATORS O BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/1001251946 DIGITALISIERT DURCH XII TABLE
OF CONTENTS NETWORK SECURITY HOST-BASED SECURITY SENSOR INTEGRITY IN
MULTIPROCESSING ENVIRONMENTS 138 THOMAS RICHARD MCEVOY AND STEPHEN D-
WOLTHUSEN USING PURPOSE CAPTURING SIGNATURES TO DEFEAT COMPUTER VIRUS
MUTATING 153 XIAOQI JIA, XI XIONG, JIWU JING, AND PENG LIU RATE-BASED
WATERMARK TRACEBACK: A NEW APPROACH 172 ZONGBIN LIU, JIWU JING, AND PENG
LIU LOCALLY MULTIPATH ADAPTIVE ROUTING PROTOCOL RESILIENT TO SELFISHNESS
AND WORMHOLES 187 FARSHID FARHAT, MOHAMMAD-REZA PAKRAVAN, MAHMOUD
SALMASIZADEH, AND MOHAMMAD-REZA AREF ACCESS CONTROL SECURITY ANALYSIS
AND VALIDATION FOR ACCESS CONTROL IN MULTI-DOMAIN ENVIRONMENT BASED ON
RISK 201 ZHUO TANG, SHAOHUA ZHANG, KENLI LI, AND BENMING FENG A PROPOSAL
OF APPROPRIATE EVALUATION SCHEME FOR EXCHANGEABLE CAS (XCAS) 217 YU-NA
HWANG, HANJAE JEONG, SUNGKYU CHO, SONGYI KIM, DONGHO WON, AND SEUNGJOO
KIM IDENTITY MANAGEMENT A TRUSTWORTHY ID MANAGEMENT MECHANISM IN OPEN
MARKET 229 INKYUNG JEUN AND DONGHO WON BIOID: BIOMETRIC-BASED IDENTITY
MANAGEMENT 241 BYOUNG-JIN HAN, DONG-WHI SHIN, HYOUNG-JIN LIM, IN-KYUNG
JEUN, AND HYUN-CHUL JUNG TRUST MANAGEMENT PRIVACY PRESERVING OF TRUST
MANAGEMENT CREDENTIALS BASED ON TRUSTED COMPUTIN 399 TABLE OF CONTENTS
XIII PUBLIC KEY CRYPTOGRAPHY AN EFFICIENT CONVERTIBLE UNDENIABLE
SIGNATURE SCHEME WITH DELEGATABLE VERIFICATION 270 JACOB C.N. SCHULDT
AND KANTA MATSUURA CERTIFICATELESS KEM AND HYBRID SIGNCRYPTION SCHEMES
REVISITED 294 5. SHARMILA DEVA SELVI, S. SREE VIVEK, AND C. PANDU RANGAN
A DENIABLE GROUP KEY ESTABLISHMENT PROTOCOL IN THE STANDARD MODEL 308
YAZHE ZHANG, KUNPENG WANG, AND BAO LI THRESHOLD PASSWORD-BASED
AUTHENTICATED GROUP KEY EXCHANGE IN GATEWAY-ORIENTED SETTING 324 HUI LI,
CHUAN-KUN WU, AND LINGBO WEI SECURITY APPLICATIONS BINARY IMAGE
STEGANOGRAPHIC TECHNIQUES CLASSIFICATION BASED ON MULTI-CLASS
STEGANALYSIS 341 KANG LENG CHIEW AND JOSEF PIEPRZYK GAME THEORETIC
RESISTANCE TO DENIAL OF SERVICE ATTACKS USING HIDDEN DIFFICULTY PUZZLES
359 HARIKRISHNA NARASIMHAN, VENKATANATHAN VARADARAJAN, AND C. PANDU
RANGAN ATTACKING AND IMPROVING ON LEE AND CHIU'S AUTHENTICATION SCHEME
L'SING SMART CARDS 377 YOUNGSOOK LEE, HYUNGKYU YANG, AND DONGHO WON
PROTECTION PROFILE FOR SECURE E-VOTING SYSTEMS 386 KWANGWOO LEE. YUNHO
LEE. DONGHO WON. AND SEUNGJOO KIM AUTHOR INDEX |
any_adam_object | 1 |
author_GND | (DE-588)141155620 |
building | Verbundindex |
bvnumber | BV036433803 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f DAT 050f |
ctrlnum | (OCoLC)637032743 (DE-599)DNB1001251946 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036433803</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100629</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100503s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N14</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1001251946</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642128264</subfield><subfield code="c">kart. : EUR 66.34 (freier Pr.), sfr 96.50 (freier Pr.)</subfield><subfield code="9">978-3-642-12826-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642128264</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80013469</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)637032743</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1001251946</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security, practice and experience</subfield><subfield code="b">6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings</subfield><subfield code="c">Jin Kwak ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 397 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6047</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Seoul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kwak, Chin</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)141155620</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISPEC</subfield><subfield code="n">6</subfield><subfield code="d">2010</subfield><subfield code="c">Seoul</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16063911-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6047</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6047</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3450003&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020306317&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020306317</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Seoul gnd-content |
genre_facet | Konferenzschrift 2010 Seoul |
id | DE-604.BV036433803 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:12:18Z |
institution | BVB |
institution_GND | (DE-588)16063911-6 |
isbn | 9783642128264 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020306317 |
oclc_num | 637032743 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 |
physical | XIII, 397 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings Jin Kwak ... (ed.) Berlin [u.a.] Springer 2010 XIII, 397 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6047 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Seoul gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Zugriffskontrolle (DE-588)4293034-0 s Kwak, Chin Sonstige (DE-588)141155620 oth ISPEC 6 2010 Seoul Sonstige (DE-588)16063911-6 oth Lecture notes in computer science 6047 (DE-604)BV000000607 6047 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3450003&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020306317&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings |
title_auth | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings |
title_exact_search | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings |
title_full | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings Jin Kwak ... (ed.) |
title_fullStr | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings Jin Kwak ... (ed.) |
title_full_unstemmed | Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings Jin Kwak ... (ed.) |
title_short | Information security, practice and experience |
title_sort | information security practice and experience 6th international conference ispec 2010 seoul korea may 12 13 2010 proceedings |
title_sub | 6th international conference, ISPEC 2010, Seoul, Korea, May 12 - 13, 2010 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datensicherung Zugriffskontrolle Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Konferenzschrift 2010 Seoul |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3450003&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020306317&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kwakchin informationsecuritypracticeandexperience6thinternationalconferenceispec2010seoulkoreamay12132010proceedings AT ispecseoul informationsecuritypracticeandexperience6thinternationalconferenceispec2010seoulkoreamay12132010proceedings |