Information and communications security: 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6476 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XIV, 474 S. graph. Darst. |
ISBN: | 9783642176494 3642176496 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036874490 | ||
003 | DE-604 | ||
005 | 20110224 | ||
007 | t| | ||
008 | 101220s2010 gw d||| |||| 10||| eng d | ||
015 | |a 10,N45 |2 dnb | ||
016 | 7 | |a 1008091480 |2 DE-101 | |
020 | |a 9783642176494 |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. sfr 89.00 (freier Pr.) |9 978-3-642-17649-4 | ||
020 | |a 3642176496 |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. sfr 89.00 (freier Pr.) |9 3-642-17649-6 | ||
024 | 3 | |a 9783642176494 | |
028 | 5 | 2 | |a Best.-Nr.: 80028933 |
035 | |a (OCoLC)695566400 | ||
035 | |a (DE-599)DNB1008091480 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-91G |a DE-11 |a DE-83 |a DE-525 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Soriano, Miguel |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information and communications security |b 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings |c Miguel Soriano ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIV, 474 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6476 | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymität |0 (DE-588)4471050-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Barcelona |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 3 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 3 | 2 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 4 | |5 DE-604 | |
711 | 2 | |a ICICS |n 12 |d 2010 |c Barcelona |j Sonstige |0 (DE-588)16094528-8 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6476 |w (DE-604)BV000000607 |9 6476 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3557260&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020789998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020789998 |
Datensatz im Suchindex
_version_ | 1820875285575237632 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
CRYPTOGRAPHIC HASH FUNCTIONS: THEORY AND PRACTICE (INVITED TALK) 1 BART
PRENEEL
SESSION 1A. ACCESS CONTROL
REWRITING OF SPARQL/UPDATE QUERIES FOR SECURING DATA ACCESS 4 SAID
OULMAKHZOUNE, NORA CUPPENS-BOULAHIA, FREDERIC CUPPENS, AND STEPHANE
MORUCCI
FINE-GRAINED DISCLOSURE OF ACCESS POLICIES 16
CLAUDIO AGOSTINO ARDAGNA, SABRINA DE CAPITANI DI VIMERCATI, SARA
FORESTI, GREGORY NEVEN, STEFANO PARABOSCHI, FRANZ-STEFAN PREISS,
PIERANGELA SAMARATI, AND MARIO VERDICCHIO
SESSION IB. PUBLIC KEY CRYPTOGRAPHY AND CRYPTANALYSIS
MANGER'S ATTACK REVISITED 31
FALKO STRENZKE
HORIZONTAL CORRELATION ANALYSIS ON EXPONENTIATION 46
CHRISTOPHE CLAVIER, BENOIT FEIX, GEORGES GAGNEROT, MYLENE ROUSSELLET,
AND VINCENT VERNEUIL
THRESHOLD PUBLIC-KEY ENCRYPTION WITH ADAPTIVE SECURITY AND SHORT
CIPHERTEXTS 62
BO QIN, QIANHONG WU, LEI ZHANG, AND JOSEP DOMINGO-FERRER
SESSION 1C. SECURITY IN DISTRIBUTED AND MOBILE SYSTEMS
A TRUST-BASED ROBUST AND EFFICIENT SEARCHING SCHEME FOR PEER-TO-PEER
NETWORKS 77
JAYDIP SEN
CUDACS: SECURING THE CLOUD WITH CUDA-ENABLED SECURE VIRTUALIZATION 92
FLAVIO LOMBARDI AND ROBERTO DI PIETRO
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008091480
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
SEIP: SIMPLE AND EFFICIENT INTEGRITY PROTECTION FOR OPEN MOBILE
PLATFORMS 107
XINWEN ZHANG, JEAN-PIERRE SEIFERT, AND ONUR ACIICMEZ
SECURING MOBILE ACCESS IN UBIQUITOUS NETWORKING VIA NON-ROAMING
AGREEMENT PROTOCOL 126
TALAL ALHARBI, ABDULLAH ALMUHAIDEB, AND PHU DUNG LE
COMPROMISE-RESILIENT ANTI-JAMMING FOR WIRELESS SENSOR NETWORKS 140 XUAN
JIANG, WENHUI HU, SENCUN ZHU, AND GUOHONG CAO
SESSION ID. CRYPTANALYSIS
ON PRACTICAL SECOND-ORDER POWER ANALYSIS ATTACKS FOR BLOCK CIPHERS 155
RENATO MENICOCCI, ANDREA SIMONETTI, GIUSEPPE SCOTTI, AND ALESSANDRO
TRIFILETTI
CONSECUTIVE S-BOX LOOKUPS: A TIMING ATTACK ON SNOW 3G 171 BILLY BOB
BRUMLEY, RISTO M. HAKALA, KAISA NYBERG, AND SAMPO SOVIO
SESSION 2A. AUTHENTICATION
EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING 186 BASEL
ALOMAIR AND RADHA POOVENDRAN
SECURITY ENHANCEMENT AND MODULAR TREATMENT TOWARDS AUTHENTICATED KEY
EXCHANGE 203
JIAXIN PAN, LIBIN WANG, AND CHANGSHE MA
FEDERATED SECRET HANDSHAKES WITH SUPPORT FOR REVOCATION 218 ALESSANDRO
SORNIOTTI AND REFIK MOLVA
SESSION 2B. FAIR EXCHANGE PROTOCOLS
AN AGENT-MEDIATED FAIR EXCHANGE PROTOCOL 235
GERARD DRAPER-GIL, JIANYING ZHOU, AND JOSEP LLUIS FERRER- G'OMILA
A NEW METHOD FOR FORMALIZING OPTIMISTIC FAIR EXCHANGE PROTOCOLS . . .
251 MING CHEN, KAIGUI WU, JIE XU, AND PAN HE
UNCONDITIONALLY SECURE FIRST-PRICE AUCTION PROTOCOLS USING A
MULTICOMPONENT COMMITMENT SCHEME 266
MEHRDAD NOJOUMIAN AND DOUGLAS R. STINSON
IMAGE 3
TABLE OF CONTENTS XIII
SESSION 2C. ANONYMITY AND PRIVACY
PROVING COERCION-RESISTANCE OF SCANTEGRITY II 281
RALF KUESTERS, TOMASZ TRUDERUNG, AND ANDREAS VOGT
ANONYMITY AND VERIFIABILITY IN VOTING: UNDERSTANDING (UN)LINKABILITY 296
LUCIE LANGER, HUGO JONKER, AND WOLTER PIETERS
A SECURE AND PRACTICAL APPROACH FOR PROVIDING ANONYMITY PROTECTION FOR
TRUSTED PLATFORMS 311
KURT DIETRICH AND JOHANNES WINTER
TIME WARP: HOW TIME AFFECTS PRIVACY IN LBSS 325
LUCIANA MARCONI, ROBERTO DI PIETRO, BRUNO CRISPO, AND MAURO CONTI
SESSION 2D. SOFTWARE SECURITY
RETURN-ORIENTED ROOTKIT WITHOUT RETURNS (ON THE X86) 340
PING CHEN, XIAO XING, BING MAO, AND LI XIE
EXPERIMENTAL THREAT MODEL REUSE WITH MISUSE CASE DIAGRAMS 355 JOSTEIN
JENSEN, INGER ANNE T0NDEL, AND PER HAKON MELAND
AUTOMATICALLY GENERATING PATCH IN BINARY PROGRAMS USING ATTRIBUTE-BASED
TAINT ANALYSIS 367
KAI CHEN, YIFENG LIAN, AND YINGJUN ZHANG
SESSION 3A. PROXY CRYPTOSYSTEMS
IDENTITY-BASED PROXY CRYPTOSYSTEMS WITH REVOCABILITY AND HIERARCHICAL
CONFIDENTIALITIES 383
LIHUA WANG, LICHENG WANG, MASAHIRO MAMBO, AND EIJI OKAMOTO
CIPHERTEXT POLICY ATTRIBUTE-BASED PROXY RE-ENCRYPTION 401
SONG LUO, JIANBIN HU, AND ZHONG CHEN
SESSION 3B. INTRUSION DETECTION SYSTEMS
HYBRID DETECTION OF APPLICATION LAYER ATTACKS USING MARKOV MODELS FOR
NORMALITY AND ATTACKS 416
ROLANDO S ALAZAR-HERNANDEZ AND JESUS E. DIAZ- VERDEJO
A TRUST-BASED IDS FOR THE AODV PROTOCOL 430
MOHAMED ALI AYACHI, CHRISTOPHE BIDAN, AND NICOLAS PRIGENT
IMAGE 4
XIV TABLE OF CONTENTS
IDS ALERT VISUALIZATION AND MONITORING THROUGH HEURISTIC HOST SELECTION
445
HADI SHIRAVI, ALI SHIRAVI, AND ALI A. GHORBANI
A TWO-TIER SYSTEM FOR WEB ATTACK DETECTION USING LINEAR DISCRIMINANT
METHOD 459
ZHIYUAN TAN, ARUNA JAMDAGNI, XIANGJIAN HE, PRIYADARSI NANDA, REN PING
LIU, WENJING JIA, AND WEI-CHANG YEH
AUTHOR INDEX 473 |
any_adam_object | 1 |
author | Soriano, Miguel |
author_facet | Soriano, Miguel |
author_role | aut |
author_sort | Soriano, Miguel |
author_variant | m s ms |
building | Verbundindex |
bvnumber | BV036874490 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)695566400 (DE-599)DNB1008091480 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036874490</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110224</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101220s2010 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N45</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008091480</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642176494</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. sfr 89.00 (freier Pr.)</subfield><subfield code="9">978-3-642-17649-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642176496</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. sfr 89.00 (freier Pr.)</subfield><subfield code="9">3-642-17649-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642176494</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80028933</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)695566400</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008091480</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-525</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soriano, Miguel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings</subfield><subfield code="c">Miguel Soriano ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 474 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6476</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Barcelona</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">12</subfield><subfield code="d">2010</subfield><subfield code="c">Barcelona</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16094528-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6476</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6476</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3557260&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020789998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020789998</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Barcelona gnd-content |
genre_facet | Konferenzschrift 2010 Barcelona |
id | DE-604.BV036874490 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:13Z |
institution | BVB |
institution_GND | (DE-588)16094528-8 |
isbn | 9783642176494 3642176496 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020789998 |
oclc_num | 695566400 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 DE-525 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 DE-525 |
physical | XIV, 474 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Soriano, Miguel Verfasser aut Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.) Berlin [u.a.] Springer 2010 XIV, 474 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6476 Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Anonymität (DE-588)4471050-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Barcelona gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Anonymität (DE-588)4471050-1 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s ICICS 12 2010 Barcelona Sonstige (DE-588)16094528-8 oth Lecture notes in computer science 6476 (DE-604)BV000000607 6476 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3557260&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020789998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Soriano, Miguel Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Lecture notes in computer science Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Anonymität (DE-588)4471050-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4471050-1 (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)7562931-8 (DE-588)1071861417 |
title | Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings |
title_auth | Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings |
title_exact_search | Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings |
title_full | Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.) |
title_fullStr | Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.) |
title_full_unstemmed | Information and communications security 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.) |
title_short | Information and communications security |
title_sort | information and communications security 12th international conference icics 2010 barcelona spain december 15 17 2010 proceedings |
title_sub | 12th international conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings |
topic | Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Anonymität (DE-588)4471050-1 gnd Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Kryptosystem Kryptoanalyse Anonymität Computersicherheit Datensicherung Zugriffskontrolle Authentifikation Privatsphäre Trusted Computing Konferenzschrift 2010 Barcelona |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3557260&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020789998&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT sorianomiguel informationandcommunicationssecurity12thinternationalconferenceicics2010barcelonaspaindecember15172010proceedings AT icicsbarcelona informationandcommunicationssecurity12thinternationalconferenceicics2010barcelonaspaindecember15172010proceedings |