Security and privacy in communication networks: proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
50 |
Schlagworte: | |
Online-Zugang: | BTU01 FHM01 UBG01 UBT01 UBW01 UBY01 UPA01 Volltext Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XIII, 500 S.) graph. Darst. |
ISBN: | 9783642161605 9783642161612 |
DOI: | 10.1007/978-3-642-16161-2 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV036861603 | ||
003 | DE-604 | ||
005 | 20140114 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 101209s2010 gw |||| o||u| ||||||eng d | ||
016 | 7 | |a 1006508333 |2 DE-101 | |
020 | |a 9783642161605 |c Druck |9 978-3-642-16160-5 | ||
020 | |a 9783642161612 |c online |9 978-3-642-16161-2 | ||
024 | 7 | |a 10.1007/978-3-642-16161-2 |2 doi | |
035 | |a (OCoLC)890748791 | ||
035 | |a (DE-599)DNB1006508333 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-M347 |a DE-473 |a DE-20 |a DE-703 |a DE-739 |a DE-706 |a DE-634 | ||
082 | 0 | |a 004.6 |2 22/ger | |
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Security and privacy in communication networks |b proceedings |c 6th International ICST Conference, SecureComm 2010, Singapore, September 7 - 9, 2010. Sushil Jajodia ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a 1 Online-Ressource (XIII, 500 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 50 | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |2 gnd-content | |
689 | 0 | 0 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jajodia, Sushil |d 1947- |0 (DE-588)120551683 |4 edt | |
711 | 2 | |a International Conference SecureComm |n 6 |d 2010 |c Singapur |j Sonstige |0 (DE-588)16081610-5 |4 oth | |
830 | 0 | |a Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |v 50 |w (DE-604)BV041557366 |9 50 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-16161-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777353&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-020777353 | ||
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-16161-2 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804143561536438272 |
---|---|
adam_text | TABLE OF CONTENTS MALWARE AND EMAIL SECURITY SAS: SEMANTICS AWARE
SIGNATURE GENERATION FOR POLYMORPHIC WORM DETECTION 1 DEGUANG KONG,
YOON-CHAN JHI, TAO GONG, SENCUN ZHU, PENG LIU, AND HONGSHENG XI
ANALYZING AND EXPLOITING NETWORK BEHAVIORS OF MALWARE 20 JOSE ANDRE
MORALES, AREEJ AL-BATAINEH, SHOUHUAI XU, AND RAVI SANDHU INEXPENSIVE
EMAIL ADDRESSES AN EMAIL SPAM-COMBATING SYSTEM 35 ARAM YEGENIAN AND
TASSOS DIMITRIOU ANONYMITY AND PRIVACY PRIVACY ADMINISTRATION IN
DISTRIBUTED SERVICE INFRASTRUCTURE 53 NABU AJARA, NORA CUPPENS-BOULAHIA,
AND FREDERIC CUPPENS ON THE FORMATION OF HISTORICALLY K-ANONYMOUS
ANONYMITY SETS IN A CONTINUOUS LBS 71 RINKU DEWRI, INDRAKSHI RAY,
INDRAJIT RAY, AND DARRELL WHITLEY SECURING PERSONAL HEALTH RECORDS IN
CLOUD COMPUTING: PATIENT-CENTRIC AND FINE-GRAINED DATA ACCESS CONTROL IN
MULTI-OWNER SETTINGS 89 MING LI, SHUCHENG YU, KUI REN, AND WENJING LOU
WIRELESS SECURITY A STUDY ON FALSE CHANNEL CONDITION REPORTING ATTACKS
IN WIRELESS NETWORKS 107 DONGHO KIM AND YIH-CHUN HU CHARACTERIZING THE
SECURITY IMPLICATIONS OF THIRD-PARTY EMERGENCY ALERT SYSTEMS OVER
CELLULAR TEXT MESSAGING SERVICES 125 PATRICK TRAYNOR SAVING ENERGY ON
WIFI WITH REQUIRED IPSEC 144 YOUNGSANG BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/1006508333 DIGITALISIERT DURCH XII TABLE OF CONTENTS
SYSTEMS SECURITY * I TRANSPARENT PROTECTION OF COMMODITY OS KERNELS
USING HARDWARE VIRTUALIZATION 162 MICHAEL GRACE, ZHI WANG, DEEPA
SRINIVASAN, JINKU LI, XUXIAN JIANG, ZHENKAI LIANG, AND SIARHEI LIAKH A
GENERIC CONSTRUCTION OF DYNAMIC SINGLE SIGN-ON WITH STRONG SECURITY 181
JINGUANG HAN, YI MU, WILLY SUSILO, AND JUN YAN DECORE: DETECTING CONTENT
REPURPOSING ATTACKS ON CLIENT SYSTEMS.... 199 SMITHA SUNDARESWARAN AND
ANNA C. SQUICCIARINI NETWORK SECURITY * I REALIZING A SOURCE AUTHENTIC
INTERNET 217 TOBY EHRENKRANZ, JUN LI, AND PATRICK MCDANIEL PARTIAL
DEAFNESS: A NOVEL DENIAL-OF-SERVICE ATTACK IN 802.11 NETWORKS 235 JIHYUK
CHOI, JERRY T. CHIANG, DONGHO KIM, AND YIH-CHUN HU ATTACKING
BEACON-ENABLED 802.15.4 NETWORKS 253 SANG SHIN JUNG, MARCO VALERO, ANU
BOURGEOIS, AND RAHEEM BEYAH SUPPORTING PUBLICATION AND SUBSCRIPTION
CONFIDENTIALITY IN PUB/SUB NETWORKS 272 MIHAELA ION, GIOVANNI RUSSELLO,
AND BRUNO CRISPO SECURITY PROTOCOLS * I CED 2 : COMMUNICATION EFFICIENT
DISJOINTNESS DECISION 290 LUCIANA MARCONI, MAURO CONTI, AND ROBERTO DI
PIETRO IMPOSSIBILITY OF FINDING ANY THIRD FAMILY OF SERVER PROTOCOLS
INTEGRATING BYZANTINE QUORUM SYSTEMS WITH THRESHOLD SIGNATURE SCHEME
TABLE OF CONTENTS XIII ENHANCING HOST SECURITY USING EXTERNAL
ENVIRONMENT SENSORS 362 EE-CHIEN CHANG, LIMING LU, YONGZHENG WU, ROLAND
H.C. YAP, AND JIE YU FADE: SECURE OVERLAY CLOUD STORAGE WITH FILE
ASSURED DELETION 380 YANG TANG, PATRICK P.C. LEE, JOHN C.S. LUI, AND
RADIA PERLMAN SECURITY PROTOCOLS * II A NEW INFORMATION LEAKAGE MEASURE
FOR ANONYMITY PROTOCOLS 398 SAMI ZHIOUA HIDDEN MARKOV MODELS FOR
AUTOMATED PROTOCOL LEARNING 415 SEAN WHALEN, MATT BISHOP, AND JAMES P.
CRUTCHFIELD EPISTEMIC MODEL CHECKING FOR KNOWLEDGE-BASED PROGRAM
IMPLEMENTATION: AN APPLICATION TO ANONYMOUS BROADCAST 429 OMAR I.
AL-BATAINEH AND RONR VAN DER MEYDEN NETWORK SECURITY * II SURVEYING DNS
WILDCARD USAGE AMONG THE GOOD, THE BAD, AND THE UGLY 448 ANDREW KALAFUT,
MINAXI GUPTA, PAIROJ RATTADILOK, AND PRAGNESHKUMAR POTEI THE
HITCHHIKER S GUIDE TO DNS CACHE POISONING 466 SOOEL SON AND VITALY
SHMATIKOV A FORMAL DEFINITION OF ONLINE ABUSE-FREENESS 484 RALF KUESTERS,
HENNING SCHNOOR, AND TOMASZ TRUDERUNG AUTHOR INDEX 499
|
any_adam_object | 1 |
author2 | Jajodia, Sushil 1947- |
author2_role | edt |
author2_variant | s j sj |
author_GND | (DE-588)120551683 |
author_facet | Jajodia, Sushil 1947- |
building | Verbundindex |
bvnumber | BV036861603 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)890748791 (DE-599)DNB1006508333 |
dewey-full | 004.6 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science 005 - Computer programming, programs, data, security |
dewey-raw | 004.6 005.8 |
dewey-search | 004.6 005.8 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-16161-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03321nmm a2200649 cb4500</leader><controlfield tag="001">BV036861603</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140114 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">101209s2010 gw |||| o||u| ||||||eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1006508333</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642161605</subfield><subfield code="c">Druck</subfield><subfield code="9">978-3-642-16160-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642161612</subfield><subfield code="c">online</subfield><subfield code="9">978-3-642-16161-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-16161-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890748791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1006508333</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy in communication networks</subfield><subfield code="b">proceedings</subfield><subfield code="c">6th International ICST Conference, SecureComm 2010, Singapore, September 7 - 9, 2010. Sushil Jajodia ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 500 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">50</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Conference SecureComm</subfield><subfield code="n">6</subfield><subfield code="d">2010</subfield><subfield code="c">Singapur</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16081610-5</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</subfield><subfield code="v">50</subfield><subfield code="w">(DE-604)BV041557366</subfield><subfield code="9">50</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777353&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020777353</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-16161-2</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 gnd-content |
genre_facet | Konferenzschrift 2010 |
id | DE-604.BV036861603 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:49:37Z |
institution | BVB |
institution_GND | (DE-588)16081610-5 |
isbn | 9783642161605 9783642161612 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020777353 |
oclc_num | 890748791 |
open_access_boolean | |
owner | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 |
owner_facet | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 |
physical | 1 Online-Ressource (XIII, 500 S.) graph. Darst. |
psigel | ZDB-2-SCS |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
series2 | Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
spelling | Security and privacy in communication networks proceedings 6th International ICST Conference, SecureComm 2010, Singapore, September 7 - 9, 2010. Sushil Jajodia ... (eds.) Berlin [u.a.] Springer 2010 1 Online-Ressource (XIII, 500 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50 Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 gnd-content Telekommunikationsnetz (DE-588)4133586-7 s Privatsphäre (DE-588)4123980-5 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s DE-604 Jajodia, Sushil 1947- (DE-588)120551683 edt International Conference SecureComm 6 2010 Singapur Sonstige (DE-588)16081610-5 oth Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50 (DE-604)BV041557366 50 https://doi.org/10.1007/978-3-642-16161-2 Verlag Volltext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777353&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security and privacy in communication networks proceedings Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Computersicherheit (DE-588)4274324-2 gnd Kryptoanalyse (DE-588)4830502-9 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4830502-9 (DE-588)4011144-1 (DE-588)4123980-5 (DE-588)4133586-7 (DE-588)1071861417 |
title | Security and privacy in communication networks proceedings |
title_auth | Security and privacy in communication networks proceedings |
title_exact_search | Security and privacy in communication networks proceedings |
title_full | Security and privacy in communication networks proceedings 6th International ICST Conference, SecureComm 2010, Singapore, September 7 - 9, 2010. Sushil Jajodia ... (eds.) |
title_fullStr | Security and privacy in communication networks proceedings 6th International ICST Conference, SecureComm 2010, Singapore, September 7 - 9, 2010. Sushil Jajodia ... (eds.) |
title_full_unstemmed | Security and privacy in communication networks proceedings 6th International ICST Conference, SecureComm 2010, Singapore, September 7 - 9, 2010. Sushil Jajodia ... (eds.) |
title_short | Security and privacy in communication networks |
title_sort | security and privacy in communication networks proceedings |
title_sub | proceedings |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptoanalyse (DE-588)4830502-9 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd |
topic_facet | Computersicherheit Kryptoanalyse Datensicherung Privatsphäre Telekommunikationsnetz Konferenzschrift 2010 |
url | https://doi.org/10.1007/978-3-642-16161-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020777353&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041557366 |
work_keys_str_mv | AT jajodiasushil securityandprivacyincommunicationnetworksproceedings AT internationalconferencesecurecommsingapur securityandprivacyincommunicationnetworksproceedings |