Advances in information and computer security: 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6434 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 370 S. graph. Darst. 24 cm |
ISBN: | 9783642168246 3642168248 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036774881 | ||
003 | DE-604 | ||
005 | 20190122 | ||
007 | t| | ||
008 | 101115s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N40 |2 dnb | ||
016 | 7 | |a 1007314044 |2 DE-101 | |
020 | |a 9783642168246 |c kart. : EUR 57.78 (DE) (freier Pr.), sfr 77.50 (freier Pr.) |9 978-3-642-16824-6 | ||
020 | |a 3642168248 |9 3-642-16824-8 | ||
024 | 3 | |a 9783642168246 | |
028 | 5 | 2 | |a Best.-Nr.: 80025811 |
035 | |a (OCoLC)700527184 | ||
035 | |a (DE-599)DNB1007314044 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in information and computer security |b 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings |c Isao Echizen ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIII, 370 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6434 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Kobe |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 3 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Echizen, Isao |e Sonstige |0 (DE-588)142767611 |4 oth | |
711 | 2 | |a International Workshop on Security |n 5 |d 2010 |c Kōbe |j Sonstige |0 (DE-588)16089251-X |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6434 |w (DE-604)BV000000607 |9 6434 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3544064&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020691655&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020691655 |
Datensatz im Suchindex
_version_ | 1820875280220160000 |
---|---|
adam_text |
TABLE OF CONTENTS INVITED TALKS AUTOMATING SECURITY CONFIGURATION AND
ADMINISTRATION: AN ACCESS CONTROL PERSPECTIVE 1 JAIDEEP VAIDYA SECURITY
METRICS AND SECURITY INVESTMENT MODELS 10 RAINER BOEHME ENCRYPTION
PUBLISHING UPPER HALF OF RSA DECRYPTION EXPONENT 25 SUBHAMOY MAITRA,
SANTANU SAERKAR, AND SOURAV SEN GUPTA PA1 AND IND-CCA2 DO NOT GUARANTEE
PA2: BRIEF EXAMPLES 40 YAMIN LIU, BAO LI, XIANHUI LU, AND YAZHE ZHANG A
GENERIC METHOD FOR REDUCING CIPHERTEXT LENGTH OF REPRODUCIBLE KEMS IN
THE RO MODEL 55 YUSUKE SAKAI, GOICHIRO HANAOKA, KAORU KUROSAWA, AND
KAZUO OHTA AN IMPROVEMENT OF KEY GENERATION ALGORITHM FOR GENTRY'S
HOMOMORPHIC ENCRYPTION SCHEME 70 NAOKI OGURA, GO YAMAMOTO, TETSUTARO
KOBAYASHI, AND SHIGENORI UCHIYAMA DATA AND WEB SECURITY PRACTICAL
UNIVERSAL RANDOM SAMPLING 84 MAREK KLONOWSKI, MICHAL PRZYKUCKI, TOMASZ
STRUMINSKI, AND MALGORZATA SULKOWSKA HORIZONTAL FRAGMENTATION FOR DATA
OUTSOURCING WITH FORMULA-BASED CONFIDENTIALITY CONSTRAINTS 101 LENA
WIESE EXPERIMENTAL ASSESSMENT OF PROBABILISTIC FINGERPRINTING CODES OVER
AWGN CHANNEL 117 MINORA KURIBAYASHI VALIDATING SECURITY POLICY
CONFORMANCE WITH WS-SECURITY REQUIREMENTS 133 FUMIKO BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/1007314044 DIGITALISIERT DURCH XII TABLE
OF CONTENTS PROTOCOLS EFFICIENT SECURE AUCTION PROTOCOLS BASED ON THE
BONEH-GOH-NISSIM ENCRYPTION 149 TAKUHO MITSUNAGA, YOSHIFUMI MANABE, AND
TATSUAKI OKAMOTO HIERARCHICAL ID-BASED AUTHENTICATED KEY EXCHANGE
RESILIENT TO EPHEMERAL KEY LEAKAGE 164 ATSUSHI FUJIOKA, KOUTAROU SUZUKI,
AND KAZUKI YONEYAMA GROUP SIGNATURE IMPLIES PKE WITH NON-INTERACTIVE
OPENING AND THRESHOLD PKE 181 KEITA EMURA, GOICHIRO HANAOKA, AND YUSUKE
SAKAI NETWORK SECURITY A GENERIC BINARY ANALYSIS METHOD FOR MALWARE 199
TOMONORI IZUMIDA, KOKICHI FUTATSUGI, AND AKIRA MORI A-HIP: A SOLUTION
OFFERING SECURE AND ANONYMOUS COMMUNICATIONS IN MANETS 217 CARLOS T.
CALAFATE, JAVIER CAMPOS, MARGA NACHER, PIETRO MANZONI, AND JUAN-CARLOS
CANO SECURING MANET MULTICAST USING DIPLOMA 232 MANSOOR ALICHERRY AND
ANGELOS D. KEROMYTIS BLOCK CIPHER PREIMAGE ATTACKS AGAINST VARIANTS OF
VERY SMOOTH HASH 251 KIMMO HALUNEN AND JUHA ROENING MATRIX REPRESENTATION
OF CONDITIONS FOR THE COLLISION ATTACK OF SHA-1 AND ITS APPLICATION TO
THE MESSAGE MODIFICATION 267 JUN YAJIMA AND TAKESHI SHIMOYAMA MUTUAL
INFORMATION ANALYSIS UNDER THE VIEW OF HIGHER-ORDER STATISTICS 285
THANH-HA LE AND MAEL BERTHIER KNOWN-KEY ATTACKS ON RIJNDAEL WITH LARGE
BLOCKS AND STRENGTHENING SHIFTROW TABLE OF CONTENTS XIII EFFICIENT
IMPLEMENTATION OF PAIRING ON BREW MOBILE PHONES 326 TADASHI IYAMA,
SHINSAKU KIYOMOTO, KAZUHIDE FUKUSHIMA, TOSHIAKI TANAKA, AND TSUYOSHI
TAKAGI INTRODUCING MITIGATION USE CASES TO ENHANCE THE SCOPE OF TEST
CASES 337 LASSE HARJUMAA AND ILKKA TERVONEN OPTIMAL ADVERSARY BEHAVIOR
FOR THE SERIAL MODEL OF FINANCIAL ATTACK TREES 354 MARGUS NIITSOO AUTHOR
INDEX 371 |
any_adam_object | 1 |
author_GND | (DE-588)142767611 |
building | Verbundindex |
bvnumber | BV036774881 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)700527184 (DE-599)DNB1007314044 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036774881</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190122</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101115s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N40</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1007314044</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642168246</subfield><subfield code="c">kart. : EUR 57.78 (DE) (freier Pr.), sfr 77.50 (freier Pr.)</subfield><subfield code="9">978-3-642-16824-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642168248</subfield><subfield code="9">3-642-16824-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642168246</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80025811</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700527184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1007314044</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in information and computer security</subfield><subfield code="b">5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings</subfield><subfield code="c">Isao Echizen ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 370 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6434</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Kobe</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Echizen, Isao</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)142767611</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security</subfield><subfield code="n">5</subfield><subfield code="d">2010</subfield><subfield code="c">Kōbe</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16089251-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6434</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6434</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3544064&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020691655&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020691655</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Kobe gnd-content |
genre_facet | Konferenzschrift 2010 Kobe |
id | DE-604.BV036774881 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:06Z |
institution | BVB |
institution_GND | (DE-588)16089251-X |
isbn | 9783642168246 3642168248 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020691655 |
oclc_num | 700527184 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XIII, 370 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings Isao Echizen ... (ed.) Berlin [u.a.] Springer 2010 XIII, 370 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6434 Literaturangaben Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Kobe gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Elektronische Unterschrift (DE-588)4269037-7 s Sicherheitsprotokoll (DE-588)4709127-7 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s Echizen, Isao Sonstige (DE-588)142767611 oth International Workshop on Security 5 2010 Kōbe Sonstige (DE-588)16089251-X oth Lecture notes in computer science 6434 (DE-604)BV000000607 6434 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3544064&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020691655&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings Lecture notes in computer science Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4293034-0 (DE-588)4330656-1 (DE-588)4269037-7 (DE-588)1071861417 |
title | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings |
title_auth | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings |
title_exact_search | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings |
title_full | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings Isao Echizen ... (ed.) |
title_fullStr | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings Isao Echizen ... (ed.) |
title_full_unstemmed | Advances in information and computer security 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings Isao Echizen ... (ed.) |
title_short | Advances in information and computer security |
title_sort | advances in information and computer security 5th international workshop on security iwsec 2010 kobe japan november 22 24 2010 proceedings |
title_sub | 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22 - 24, 2010 ; proceedings |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Computersicherheit Kryptologie Sicherheitsprotokoll Datensicherung Rechnernetz Zugriffskontrolle Authentifikation Elektronische Unterschrift Konferenzschrift 2010 Kobe |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3544064&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020691655&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT echizenisao advancesininformationandcomputersecurity5thinternationalworkshoponsecurityiwsec2010kobejapannovember22242010proceedings AT internationalworkshoponsecuritykobe advancesininformationandcomputersecurity5thinternationalworkshoponsecurityiwsec2010kobejapannovember22242010proceedings |