Decision and game theory for security: first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u..a]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6442 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XII, 265 S. graph. Darst. 24 cm |
ISBN: | 9783642171963 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036801906 | ||
003 | DE-604 | ||
005 | 20110121 | ||
007 | t| | ||
008 | 101129s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N42 |2 dnb | ||
016 | 7 | |a 1007589701 |2 DE-101 | |
020 | |a 9783642171963 |c kart. : EUR 49.22 (DE) (freier Pr.), sfr 66.00 (freier Pr.) |9 978-3-642-17196-3 | ||
024 | 3 | |a 9783642171963 | |
028 | 5 | 2 | |a Best.-Nr.: 80027499 |
035 | |a (OCoLC)694880475 | ||
035 | |a (DE-599)DNB1007589701 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a MAT 920f |2 stub | ||
084 | |a MAT 624f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Decision and game theory for security |b first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings |c Tansu Alpcan ... (eds.) |
264 | 1 | |a Berlin [u..a] |b Springer |c 2010 | |
300 | |a XII, 265 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6442 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymität |0 (DE-588)4471050-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Autorisierung |0 (DE-588)4638999-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Berlin |2 gnd-content | |
689 | 0 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 1 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 1 | 2 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 1 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 4 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 1 | 5 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 6 | |a Autorisierung |0 (DE-588)4638999-4 |D s |
689 | 1 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Alpcan, Tansu |e Sonstige |4 oth | |
711 | 2 | |a GameSec |n 1 |d 2010 |c Berlin |j Sonstige |0 (DE-588)16091228-3 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6442 |w (DE-604)BV000000607 |9 6442 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3549175&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020718067 |
Datensatz im Suchindex
_version_ | 1820875282769248256 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
SECURITY INVESTMENTS AND PLANNING DESIGN OF NETWORK TOPOLOGY IN AN
ADVERSARIAL ENVIRONMENT 1 ASSANE GUEYE, JEAN C. WALRAND, AND VENKAT
ANANTHARAM
OPTIMAL INFORMATION SECURITY INVESTMENT WITH PENETRATION TESTING 21
RAINER BOEHME AND MARK FELEGYHAZI
PRIVACY AND ANONYMITY
TRACKING GAMES IN MOBILE NETWORKS 38
MATHIAS HUMBERT, MOHAMMAD HOSSEIN MANSHAEI, JULIEN FREUDIGER, AND
JEAN-PIERRE HUBAUX
GPATH: A GAME-THEORETIC PATH SELECTION ALGORITHM TO PROTECT TOR'S
ANONYMITY 58
NAN ZHANG, WEI YU, XINWEN FU, AND SAJAL K. DAS
WHEN DO FIRMS INVEST IN PRIVACY-PRESERVING TECHNOLOGIES? 72 MURAT
KANTARCIOGLU, ALAIN BENSOUSSAN, AND SINGRU(CELINE) HOE
ADVERSARIAL AND ROBUST CONTROL
ADVERSARIAL CONTROL IN A DELAY TOLERANT NETWORK 87
EITAN ALTMAN, TAMER BASAR, AND VEERARUNA KAVITHA
SECURITY INTERDEPENDENCIES FOR NETWORKED CONTROL SYSTEMS WITH IDENTICAL
AGENTS 107
SAURABH AMIN, GALINA A. SCHWARTZ, AND S. SHANKAR SASTRY
ROBUST CONTROL IN SPARSE MOBILE AD-HOC NETWORKS 123
EITAN ALTMAN, ALIREZA ARAM, TAMER BASAR, CORINNE TOUATI, AND SASWATI
SARKAR
NETWORK SECURITY AND BOTNETS
A GAME-THEORETICAL APPROACH FOR FINDING OPTIMAL STRATEGIES IN A BOTNET
DEFENSE MODEL 135
ALAIN BENSOUSSAN, MURAT KANTARCIOGLU, AND SINGRU(CELINE) HOE
ISPS AND AD NETWORKS AGAINST BOTNET AD FRAUD 149
NEVENA VRATONJIC, MOHAMMAD HOSSEIN MANSHAEI, MAXIM RAYA, AND JEAN-PIERRE
HUBAUX
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1007589701
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
A LOCALIZATION GAME IN WIRELESS SENSOR NETWORKS 168
NICOLA GATTI, MATTIA MONGA, AND SABRINA SICARI
EFFECTIVE MULTIMODEL ANOMALY DETECTION USING COOPERATIVE NEGOTIATION 180
ALBERTO VOLPATTO, FEDERICO MAGGI, AND STEFANO ZANERO
AUTHORIZATION AND AUTHENTICATION
THE PASSWORD GAME: NEGATIVE EXTERNALITIES FROM WEAK PASSWORD PRACTICES
192
SOEREN PREIBUSCH AND JOSEPH BONNEAU
TOWARDS A GAME THEORETIC AUTHORISATION MODEL 208
FARZAD SALIM, JASON REID, UWE DULLECK, AND ED DAWSON
THEORY AND ALGORITHMS FOR SECURITY
DISPERSE OR UNITE? A MATHEMATICAL MODEL OF COORDINATED ATTACK 220 STEVE
ALPERN, ROBBERT FOKKINK, JORAM OP DEN KELDER, AND TOM LIDBETTER
UNCERTAINTY IN INTERDEPENDENT SECURITY GAMES 234
BENJAMIN JOHNSON, JENS GROSSKLAGS, NICOLAS CHRISTIN, AND JOHN CHUANG
ATTACK-DEFENSE TREES AND TWO-PLAYER BINARY ZERO-SUM EXTENSIVE FORM GAMES
ARE EQUIVALENT 245
BARBARA KORDY, SJOUKE MAUW, MATTHIJS MELISSEN, AND PATRICK SCHWEITZER
METHODS AND ALGORITHMS FOR INFINITE BAYESIAN STACKELBERG SECURITY GAMES
(EXTENDED ABSTRACT) 257
CHRISTOPHER KIEKINTVELD, JANUSZ MARECKI, AND MILIND TAMBE
AUTHOR INDEX 267 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036801906 |
classification_rvk | SS 4800 |
classification_tum | MAT 920f MAT 624f DAT 461f |
ctrlnum | (OCoLC)694880475 (DE-599)DNB1007589701 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036801906</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110121</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101129s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N42</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1007589701</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642171963</subfield><subfield code="c">kart. : EUR 49.22 (DE) (freier Pr.), sfr 66.00 (freier Pr.)</subfield><subfield code="9">978-3-642-17196-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642171963</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80027499</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)694880475</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1007589701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 920f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 624f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decision and game theory for security</subfield><subfield code="b">first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings</subfield><subfield code="c">Tansu Alpcan ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u..a]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 265 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6442</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Berlin</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="6"><subfield code="a">Autorisierung</subfield><subfield code="0">(DE-588)4638999-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alpcan, Tansu</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">GameSec</subfield><subfield code="n">1</subfield><subfield code="d">2010</subfield><subfield code="c">Berlin</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16091228-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6442</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6442</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3549175&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020718067</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Berlin gnd-content |
genre_facet | Konferenzschrift 2010 Berlin |
id | DE-604.BV036801906 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:09Z |
institution | BVB |
institution_GND | (DE-588)16091228-3 |
isbn | 9783642171963 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020718067 |
oclc_num | 694880475 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XII, 265 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings Tansu Alpcan ... (eds.) Berlin [u..a] Springer 2010 XII, 265 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6442 Literaturangaben Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Anonymität (DE-588)4471050-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Autorisierung (DE-588)4638999-4 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Spieltheorie (DE-588)4056243-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Berlin gnd-content Netzwerkverwaltung (DE-588)4314339-8 s Netzwerktopologie (DE-588)4208537-8 s Computersicherheit (DE-588)4274324-2 s Spieltheorie (DE-588)4056243-8 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Anonymität (DE-588)4471050-1 s Privatsphäre (DE-588)4123980-5 s Autorisierung (DE-588)4638999-4 s Authentifikation (DE-588)4330656-1 s Alpcan, Tansu Sonstige oth GameSec 1 2010 Berlin Sonstige (DE-588)16091228-3 oth Lecture notes in computer science 6442 (DE-604)BV000000607 6442 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3549175&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings Lecture notes in computer science Netzwerktopologie (DE-588)4208537-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd Anonymität (DE-588)4471050-1 gnd Computersicherheit (DE-588)4274324-2 gnd Autorisierung (DE-588)4638999-4 gnd Authentifikation (DE-588)4330656-1 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4208537-8 (DE-588)4830502-9 (DE-588)4471050-1 (DE-588)4274324-2 (DE-588)4638999-4 (DE-588)4330656-1 (DE-588)4056243-8 (DE-588)4123980-5 (DE-588)4314339-8 (DE-588)1071861417 |
title | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings |
title_auth | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings |
title_exact_search | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings |
title_full | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings Tansu Alpcan ... (eds.) |
title_fullStr | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings Tansu Alpcan ... (eds.) |
title_full_unstemmed | Decision and game theory for security first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings Tansu Alpcan ... (eds.) |
title_short | Decision and game theory for security |
title_sort | decision and game theory for security first international conference gamesec 2010 berlin germany november 22 23 2010 proceedings |
title_sub | first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings |
topic | Netzwerktopologie (DE-588)4208537-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd Anonymität (DE-588)4471050-1 gnd Computersicherheit (DE-588)4274324-2 gnd Autorisierung (DE-588)4638999-4 gnd Authentifikation (DE-588)4330656-1 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Netzwerktopologie Kryptoanalyse Anonymität Computersicherheit Autorisierung Authentifikation Spieltheorie Privatsphäre Netzwerkverwaltung Konferenzschrift 2010 Berlin |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3549175&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT alpcantansu decisionandgametheoryforsecurityfirstinternationalconferencegamesec2010berlingermanynovember22232010proceedings AT gamesecberlin decisionandgametheoryforsecurityfirstinternationalconferencegamesec2010berlingermanynovember22232010proceedings |