Recent trends in network security and applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Communications in computer and information science
89 |
Schlagworte: | |
Online-Zugang: | BTU01 FHM01 UBG01 UBT01 UBW01 UBY01 UPA01 Volltext Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XX, 636 S.) graph. Darst. |
ISBN: | 9783642144783 |
DOI: | 10.1007/978-3-642-14478-3 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV036679658 | ||
003 | DE-604 | ||
005 | 20230324 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 100921s2010 gw |||| o||u| ||||||eng d | ||
016 | 7 | |a 1003553419 |2 DE-101 | |
020 | |a 9783642144783 |c Online |9 978-3-642-14478-3 | ||
024 | 7 | |a 10.1007/978-3-642-14478-3 |2 doi | |
035 | |a (OCoLC)658324957 | ||
035 | |a (DE-599)DNB1003553419 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-M347 |a DE-473 |a DE-20 |a DE-703 |a DE-739 |a DE-706 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Recent trends in network security and applications |b Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings |c Natarajan Meghanathan ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a 1 Online-Ressource (XX, 636 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 89 | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Chennai |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 2 | 1 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Datenbanksystem |0 (DE-588)4113276-2 |D s |
689 | 3 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Meghanathan, Natarajan |d 1977- |0 (DE-588)1191783391 |4 edt | |
711 | 2 | |a CNSA |n 3 |d 2010 |c Chennai |j Sonstige |0 (DE-588)16074444-1 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-642-14477-6 |
830 | 0 | |a Communications in computer and information science |v 89 |w (DE-604)BV041227480 |9 89 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-14478-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020598549&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-020598549 | ||
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-14478-3 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804143307806212096 |
---|---|
adam_text | TABLE OF CONTENTS THE THIRD INTERNATIONAL CONFERENCE ON NETWORK SECURITY
AND APPLICATIONS (CNSA 2010) SECURE FRAMEWORK FOR DATA CENTRIC
HETEROGENEOUS WIRELESS SENSOR NETWORKS 1 M.K. SANDHYA AND K. MURUGAN
DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM
11 G. RAMESH AND R. UMARANI FUZZY RULE-BASE BASED INTRUSION DETECTION
SYSTEM ON APPLICATION LAYER 27 S. SANGEETHA, S. HARIPRIYA, S.G. MOHANA
PRIYA, V. VAIDEHI, AND N. SRINIVASAN TRUST MODELS.IN WIRELESS SENSOR
NETWORKS: A SURVEY 37 MOHAMMAD MOMANI LOAD BALANCING IN DISTRIBUTED WEB
CACHING 47 TIWARI RAJEEV AND KHAN GULISTA TRING: A NEW FRAMEWORK FOR
EFFICIENT GROUP KEY DISTRIBUTION FOR DYNAMIC GROUPS 55 D. V. NAGA RAJU
AND V. VALLI KUMARI IMAGE CLASSIFICATION FOR MORE RELIABLE STEGANALYSIS
66 R. SHREELEKSHMI, M. WILSCY, AND C.E. VENI MADHAVAN SECURITY FOR
HIGH-SPEED MANS/WANS 75 C.S. LAMBA BEHAVIORAL ANALYSIS OF TRANSPORT
LAYER BASED HYBRID COVERT CHANNEL 83 KOUNDINYA ANJAN AND JIBI ABRAHAM
EFFICIENT ENCRYPTION OF INTRA AND INTER FRAMES IN MPEG VIDEO 93 V.
VIJAYALAKSHMI, L.M. VARALAKSHMI, AND G.F. SUDHA VLSI DESIGN AND
IMPLEMENTATION OF COMBINED SECURE HASH ALGORITHM SHA-51 BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/1003553419 DIGITALISIERT DURCH XVI TABLE
OF CONTENTS PERFORMANCE COMPARISON OF MULTICAST ROUTING PROTOCOLS UNDER
VARIABLE BIT RATE SCENARIO FOR MOBILE ADHOC NETWORKS 114 N. BHALAJI, P.
GURUNATHAN, AND A. SHANMUGAM A TRUST BASED TECHNIQUE TO ISOLATE
NON-FORWARDING NODES IN DSR BASEDMOBILE ADHOC NETWORKS 123 N. BHALAJI
AND A. SHANMUGAM ENSURED QUALITY OF ADMITTED VOICE CALLS THROUGH
AUTHORIZED VOIP NETWORKS 132 T. SUBASHRI, B. GOKUL VINOTH KUMAR, AND V.
VAIDEHI WIRELESS MESH NETWORKS: ROUTING PROTOCOLS AND CHALLENGES 143
PAVAN KUMAR PONNAPALLI, RAMESH BABU BATTULA, PAVAN KUMAR TUMMALA, AND
SRIKANTH VEMURU COMPARATIVE ANALYSIS OF FORMAL MODEL CHECKING TOOLS FOR
SECURITY PROTOCOL VERIFICATION 152 REEMA PATEL, BHAVESH BORISANIYA, AVI
PATEL, DHIREN PATEL, MUTTUKRISHNAN RAJARAJAN, AND ANDREA ZISMAN SECURED
PARADIGM FOR MOBILE DATABASES 164 D. ROSELIN SELVARANI ENERGY ANALYSIS
OF RSA AND ELGAMAL ALGORITHMS FOR WIRELESS SENSOR NETWORKS 172 R.
KAYALVIZHI, M. VIJAYALAKSHMI, AND V. VAIDEHI DETECTION AND MITIGATION OF
ATTACKS BY COLLUDING MISBEHAVING NODES IN MANET 181 POONAM, K. GARG, AND
M. MISRA A FLOW BASED SLOW AND FAST SCAN DETECTION SYSTEM 191 N.
MURALEEDHARAN AND ARUN PAERMAR A NEW REMOTE MUTUAL AUTHENTICATION SCHEME
FOR WI-FI ENABLEDHAND-HEL TABLE OF CONTENTS XVII A SAT BASED
VERIFICATION FRAMEWORK FOR WIRELESS LAN SECURITY POLICY MANAGEMENT
SUPPORTED BY STRBAC MODEL 232 P. BERA, SOUMYA MAITY, S.K. GHOSH, AND
PALLAB DASGUPTA DETECTION AND CLASSIFICATION OF DDOS ATTACKS USING FUZZY
INFERENCE SYSTEM 242 T. SUBBULAKSHMI, S. MERCY SHALINIE, C. SUNEEL
REDDY, AND A. RAMAMOORTHI DETECTION AND RECOGNITION OF FILE MASQUERADING
FOR E-MAIL AND DATA SECURITY 253 R. DHANALAKSHMI AND C. CHELLAPPAN
PRIVACY PRESERVING MINING OF DISTRIBUTED DATA USING STEGANOGRAPHY ...
263 D. ARUNA KUMARI, K. RAJA SEKHAR RAO, AND M. SUMAN FIRST
INTERNATIONAL WORKSHOP ON TRUST MANAGEMENT IN P2P SYSTEMS (IWTMP2PS
2010) P2P PROXY RE-SIGNATURE SCHEME THAT TRANSLATES ONE TYPE OF
SIGNATURE SCHEME TO ANOTHER TYPE OF SIGNATURE SCHEME 270 N.R. SUNITHA
AND B.B. AMBERKER EFFICIENT REGION-BASED KEY AGREEMENT FOR PEER - TO -
PEER INFORMATION SHARING IN MOBILE AD HOC NETWORKS 280 K. KUMAR, J.
NAFEESA BEGUM, AND V. SUMATHY A POWER ADJUSTMENT APPROACH FOR
MULTI-CHANNEL MULTI-AP DEPLOYMENT USING COGNITIVE RADIO CONCEPT 296
PRABHAT KUMAR TIWARY, NIWAS MASKEY, AND SUMAN KHAKUREL CONSCIENCE-BASED
ROUTING IN P2P NETWORKS: PREVENTING COPYRIGHT VIOLATIONS AND SOCIAL
MALAISE 302 ANKUR GUPTA ANALYSIS OF 802.11 BASED COGNITIVE NETWORKS AND
COGNITIVE BASED 802.1 XVIII TABLE OF CONTENTS A ROADMAP FOR THE
COMPARISON OF IDENTITY MANAGEMENT SOLUTIONS BASED ON STATE-OF-THE-ART
IDM TAXONOMIES 349 SRINIVASAN MADHAN KUMAR AND PAUL RODRIGUES
BUBBLETRUST: A RELIABLE TRUST MANAGEMENT FOR LARGE P2P NETWORKS . .. 359
MIROSLAV NOVOTNY AND FILIP ZAVORAL DYNAMIC POLICY ADAPTATION FOR
COLLABORATIVE GROUPS 374 MADHUMITA CHATTERJEE AND G. SIVAKUMAR A
DEVIATION BASED OUTLIER INTRUSION DETECTION SYSTEM 395 VIKAS PAREEK,
ADITI MISHRA, ARPANA SHARMA, RASHMI CHAUHAN, AND SHRUTI BANSAL PRIVACY
PRESERVING CIPHERTEXT POLICY ATTRIBUTE BASED ENCRYPTION 402 A. BALU AND
K. KUPPUSAMY RELIABLE TIMEOUT BASED COMMIT PROTOCOL 410 BHARATI HARSOOR
AND S. RAMACHANDRAM PROPOSED SECURITY MODEL AND THREAT TAXONOMY FOR THE
INTERNET OF THINGS (IOT) 420 SACHIN BABAR, PARIKSHIT MAHALLE, ANTONIETTA
STANGO, NEELI PRASAD, AND RAMJEE PRASAD IDENTITY MANAGEMENT FRAMEWORK
TOWARDS INTERNET OF THINGS (IOT): ROADMAP AND KEY CHALLENGES 430
PARIKSHIT MAHALLE, SACHIN BABAR, NEELI R. PRASAD, AND RAMJEE PRASAD
REPUTATION ENHANCEMENT IN A TRUST MANAGEMENT SYSTEM 440 SHASHI BHANWAR
AND SEEMA BAWA A-CODE: A NEW CRYPTO PRIMITIVE FOR SECURING WIRELESS
SENSOR NETWORKS 452 GIOVANNI SCHMID AND FRANCESCO ROSSI DESIG TABLE OF
CONTENTS XIX KNOWLEDGE BASE COMPOUND APPROACH TOWARDS SPAM DETECTION 490
GAURAV KUMAR TAK AND SHASHIKALA TAPASWI TRUST MANAGEMENT FRAMEWORK FOR
UBIQUITOUS APPLICATIONS 500 N.C. RAGHU, M.K. CHAITHANYA, P.R.L. LAKSHMI,
G. JYOSTNA, B. MANJULATHA, AND N. SARAT A HYBRID ADDRESS ALLOCATION
ALGORITHM FOR IPV6 509 RAJA KUMAR MURUGESAN AND SURESWARAN RAMADASS
MODELING AND PERFORMANCE ANALYSIS OF EFFICIENT AND DYNAMIC PROBABILISTIC
BROADCASTING ALGORITHM IN MANETS ROUTING PROTOCOLS ... 518 DEEPAK DEMBLA
AND YOGESH CHABA A TRUST-BASED DETECTION ALGORITHM OF SELFISH PACKET
DROPPING NODES IN A PEER-TO-PEER WIRELESS MESH NETWORK 528 JAYDIP SEN A
DISTRIBUTED TRUST AND REPUTATION FRAMEWORK FOR MOBILE AD HOC NETWORKS
538 JAYDIP SEN TOWARDS DESIGNING APPLICATION SPECIFIC TRUST TREATED
MODEL 548 FARAG AZZEDIN AND SAJJAD MAHMOOD FIRST INTERNATIONAL WORKSHOP
ON DATABASE MANAGEMENT SYSTEMS (DMS 2010) AND MWNS 2010 SECURITY FOR
CONTACTLESS SMART CARDS USING CRYPTOGRAPHY 558 ANUJ KUNDARAP, ARPIT
CHHAJLANI, RASHU SINGLA, MUGDHA SAWANT, MILIND DERE, AND PARIKSHIT
MAHALLE A NOVEL APPROACH FOR COMPRESSED VIDEO STEGANOGRAPHY 567 A.P.
SHERLY, SAPNA SASIDHARAN, ASHJI S. RAJ, AND P.P. AMRITHA PRIVACY
PRESERVING DATA MINING BY CYPTOGRAPHY 576 ANAND XX TABLE OF CONTENTS ON
ANALYZING THE DEGREE OF COLDNESS IN IOWA, A NORTH CENTRAL REGION, UNITED
STATES: AN XML EXPLOITATION IN SPATIAL DATABASES 613 SUGAM SHARMA AND
SHASHI K. GADIA IMPLEMENTATION OF MPEG-7 DOCUMENT MANAGEMENT SYSTEM
BASED ON NATIVE DATABASE 625 BYEONG-TAE AHN AUTHOR INDEX 635
|
any_adam_object | 1 |
author2 | Meghanathan, Natarajan 1977- |
author2_role | edt |
author2_variant | n m nm |
author_GND | (DE-588)1191783391 |
author_facet | Meghanathan, Natarajan 1977- |
building | Verbundindex |
bvnumber | BV036679658 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)658324957 (DE-599)DNB1003553419 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-14478-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03705nmm a2200769 cb4500</leader><controlfield tag="001">BV036679658</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230324 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">100921s2010 gw |||| o||u| ||||||eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1003553419</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642144783</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-14478-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-14478-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)658324957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1003553419</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Recent trends in network security and applications</subfield><subfield code="b">Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings</subfield><subfield code="c">Natarajan Meghanathan ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 636 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">89</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Chennai</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meghanathan, Natarajan</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)1191783391</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CNSA</subfield><subfield code="n">3</subfield><subfield code="d">2010</subfield><subfield code="c">Chennai</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16074444-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-642-14477-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">89</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">89</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020598549&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020598549</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-14478-3</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Chennai gnd-content |
genre_facet | Konferenzschrift 2010 Chennai |
id | DE-604.BV036679658 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:45:35Z |
institution | BVB |
institution_GND | (DE-588)16074444-1 |
isbn | 9783642144783 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020598549 |
oclc_num | 658324957 |
open_access_boolean | |
owner | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 |
owner_facet | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 |
physical | 1 Online-Ressource (XX, 636 S.) graph. Darst. |
psigel | ZDB-2-SCS |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Communications in computer and information science |
series2 | Communications in computer and information science |
spelling | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings Natarajan Meghanathan ... (ed.) Berlin [u.a.] Springer 2010 1 Online-Ressource (XX, 636 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Communications in computer and information science 89 Computersicherheit (DE-588)4274324-2 gnd rswk-swf Drahtloses Sensorsystem (DE-588)4789222-5 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf Datenbanksystem (DE-588)4113276-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Chennai gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Drahtloses Sensorsystem (DE-588)4789222-5 s Trusted Computing (DE-588)7562931-8 s Netzwerkverwaltung (DE-588)4314339-8 s Datenbanksystem (DE-588)4113276-2 s Kryptologie (DE-588)4033329-2 s Meghanathan, Natarajan 1977- (DE-588)1191783391 edt CNSA 3 2010 Chennai Sonstige (DE-588)16074444-1 oth Erscheint auch als Druckausgabe 978-3-642-14477-6 Communications in computer and information science 89 (DE-604)BV041227480 89 https://doi.org/10.1007/978-3-642-14478-3 Verlag Volltext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020598549&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings Communications in computer and information science Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd Trusted Computing (DE-588)7562931-8 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd Datenbanksystem (DE-588)4113276-2 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4789222-5 (DE-588)7562931-8 (DE-588)4033329-2 (DE-588)4070085-9 (DE-588)4314339-8 (DE-588)4113276-2 (DE-588)4011144-1 (DE-588)1071861417 |
title | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings |
title_auth | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings |
title_exact_search | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings |
title_full | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings Natarajan Meghanathan ... (ed.) |
title_fullStr | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings Natarajan Meghanathan ... (ed.) |
title_full_unstemmed | Recent trends in network security and applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings Natarajan Meghanathan ... (ed.) |
title_short | Recent trends in network security and applications |
title_sort | recent trends in network security and applications third international conference cnsa 2010 chennai india july 23 25 2010 proceedings |
title_sub | Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 ; proceedings |
topic | Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd Trusted Computing (DE-588)7562931-8 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd Datenbanksystem (DE-588)4113276-2 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computersicherheit Drahtloses Sensorsystem Trusted Computing Kryptologie Rechnernetz Netzwerkverwaltung Datenbanksystem Datensicherung Konferenzschrift 2010 Chennai |
url | https://doi.org/10.1007/978-3-642-14478-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020598549&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT meghanathannatarajan recenttrendsinnetworksecurityandapplicationsthirdinternationalconferencecnsa2010chennaiindiajuly23252010proceedings AT cnsachennai recenttrendsinnetworksecurityandapplicationsthirdinternationalconferencecnsa2010chennaiindiajuly23252010proceedings |