Information security practice and experience: 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6672 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 448 S. graph. Darst. 24 cm |
ISBN: | 9783642210303 3642210309 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037413207 | ||
003 | DE-604 | ||
005 | 20110803 | ||
007 | t| | ||
008 | 110523s2011 xx d||| |||| 10||| eng d | ||
015 | |a 11,N20 |2 dnb | ||
016 | 7 | |a 1011288346 |2 DE-101 | |
020 | |a 9783642210303 |c kart. : EUR 66.34 (DE) (freier Pr.), ca. sfr 89.00 (freier Pr.) |9 978-3-642-21030-3 | ||
020 | |a 3642210309 |9 3-642-21030-9 | ||
024 | 3 | |a 9783642210303 | |
028 | 5 | 2 | |a Best.-Nr.: 80062661 |
035 | |a (OCoLC)844921343 | ||
035 | |a (DE-599)DNB1011288346 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Information security practice and experience |b 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings |c Feng Bao ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIII, 448 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6672 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Kanton Stadt |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 3 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Bao, Feng |e Sonstige |0 (DE-588)133921492 |4 oth | |
711 | 2 | |a ISPEC |n 7 |d 2011 |c Kanton, Stadt |j Sonstige |0 (DE-588)16157542-0 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Information Security Practice and Experience |
830 | 0 | |a Lecture notes in computer science |v 6672 |w (DE-604)BV000000607 |9 6672 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3713531&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022565617&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-022565617 |
Datensatz im Suchindex
_version_ | 1820875317365964800 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
PUBLIC KEY ENCRYPTION PUBLIC-KEY ENCRYPTIONS TOLERATING ADAPTIVE AND
COMPOSABLE ADVERSARIES 1
HUAFEI ZHU
ENCRYPTION SIMULATABILITY RECONSIDERED 14
YAMIN LIU, BAO LI, XIANHUI LU, AND XIAOYING JIA
FULLY SECURE CIPERTEXT-POLICY HIDING CP-ABE 24
JUNZUO LAI, ROBERT H. DENG, AND YINGJIU LI
GENERIC METHODS TO ACHIEVE TIGHTER SECURITY REDUCTIONS FOR A CATEGORY OF
IBE SCHEMES 40
YU CHEN, LIQUN CHEN, AND ZHONG CHEN
NEW FULLY SECURE HIERARCHICAL IDENTITY-BASED ENCRYPTION WITH CONSTANT
SIZE CIPHERTEXTS 55
SONG LUO, YU CHEN, JIANBIN HU, AND ZHONG CHEN
CLOUD SECURITY
TOWARD TRUSTWORTHY CLOUDS' INTERNET SCALE CRITICAL INFRASTRUCTURE 71
IMAD M. ABBADI
REALIZING FINE-GRAINED AND FLEXIBLE ACCESS CONTROL TO OUTSOURCED DATA
WITH ATTRIBUTE-BASED CRYPTOSYSTEMS 83
FANGMING ZHAO, TAKASHI NISHIDE, AND KOUICHI SAKURAI
HIERARCHICAL ATTRIBUTE-SET BASED ENCRYPTION FOR SCALABLE, FLEXIBLE AND
FINE-GRAINED ACCESS CONTROL IN CLOUD COMPUTING 98
JUN'E LIU, ZHIGUO WAN, AND MING GU
SECURITY APPLICATIONS
PRIVACY ENHANCED ACCESS CONTROL BY MEANS OF POLICY BLINDING 108 SAEED
SEDGHI, PIETER HARTEL, WILLEM JONKER, AND SVETLA NIKOVA
POLICY-BASED AUTHENTICATION FOR MOBILE AGENTS 123
YIKAI WANG, YI MU, AND MINJIE ZHANG
LIGHTWEIGHT DELEGATED SUBSET TEST WITH PRIVACY PROTECTION 138 XUHUA
ZHOU, XUHUA DING, AND KEFEI CHEN
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1011288346
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
POST-QUANTUM CRYPTOGRAPHY AND SIDE-CHANNEL ATTACK
IMPROVING BDD CRYPTOSYSTEMS IN GENERAL LATTICES 152
MICHAEL ROSE, THOMAS PLANTARD, AND WILLY SUSILO
KIPNIS-SHAMIR ATTACK ON UNBALANCED OIL-VINEGAR SCHEME 168 WEIWEI CAO,
LEI HU, JINTAI DING, AND ZHIJUN YIN
A NOVEL GROUP SIGNATURE SCHEME BASED ON MPKC 181
GUANGDONG YANG, SHAOHUA TANG, AND LI YANG
HOW TO CHARACTERIZE SIDE-CHANNEL LEAKAGES MORE ACCURATELY? 196 JIYE LIU,
YONGBIN ZHOU, YANG HAN, JIANTANG LI, SHUGUO YANG, AND DENGGUO FENG
BLOCK CIPHERS AND MACS
NEW IMPOSSIBLE DIFFERENTIAL AND KNOWN-KEY DISTINGUISHERS FOR THE 3D
CIPHER 208
JORGE NAKAHARA JR
MEET-IN-THE-MIDDLE ATTACK ON 8 ROUNDS OF THE AES BLOCK CIPHER UNDER 192
KEY BITS 222
YONGZHUANG WEI, JIQIANG LU, AND YUPU HU
BCBC: A MORE EFFICIENT MAC ALGORITHM 233
BO LIANG, WENLING WU, AND LITING ZHANG
ON T HE SECURITY OF 4-BIT INVOLUTIVE S-BOXES FOR LIGHTWEIGHT DESIGNS . .
. 247 BOZHONG LIU, ZHENG GONG, WEIDONG QIU, AND DONG ZHENG
SIGNATURE, SECRETE SHARING AND TRAITOR TRACING
SHORT CONVERTIBLE UNDENIABLE SIGNATURE IN THE STANDARD MODEL 257 QIONG
HUANG AND DUNCAN S. WONG
A PRACTICAL (NON-INTERACTIVE) PUBLICLY VERIFIABLE SECRET SHARING SCHEME
273
MAHABIR PRASAD JHANWAR
AN EFFICIENT GROUP-BASED SECRET SHARING SCHEME 288
CHUNLI LV, XIAOQI JIA, JINGQIANG LIN, JIWU JING, AND LIJUN TIAN
TRAITOR TRACING AGAINST PUBLIC COLLABORATION 302
XINGWEN ZHAO AND FANGGUO ZHANG
IMAGE 3
TABLE OF CONTENTS XIII
SYSTEM SECURITY AND NETWORK SECURITY
POLICY-CENTRIC PROTECTION OF OS KERNEL FROM VULNERABLE LOADABLE KERNEL
MODULES 317
DONGHAI TIAN, XI XIONG, CHANGZHEN HU, AND PENG LIU
SANITIZING MICRODATA WITHOUT LEAK: COMBINING PREVENTIVE AND CURATIVE
ACTIONS 333
TRISTAN ALLARD, BENJAMIN NGUYEN, AND PHILIPPE PUCHERAL
HIDDEN BOT DETECTION BY TRACING NON-HUMAN GENERATED TRAFFIC AT THE
ZOMBIE HOST 343
JONGHOON KWON, JEHYUN LEE, AND HEEJO LEE
A MODEL FOR CONSTRAINT AND DELEGATION MANAGEMENT 362
QUAN PHAM, JASON REID, AND ED DAWSON
SECURITY PROTOCOLS
NON-BLACK-BOX COMPUTATION OF LINEAR REGRESSION PROTOCOLS WITH MALICIOUS
ADVERSARIES 372
HUAFEI ZHU
A NEW SECURITY PROOF OF PRACTICAL CRYPTOGRAPHIC DEVICES BASED ON
HARDWARE, SOFTWARE AND PROTOCOLS 386
AN WANG, ZHENG LI, XIANWEN YANG, AND YANYAN YU
A GENERAL AND EFFICIENT OBFUSCATION FOR PROGRAMS WITH TAMPER-PROOF
HARDWARE 401
NING DING AND DAWU GU
ANALYSIS AND IMPROVEMENT OF AN AUTHENTICATED KEY EXCHANGE PROTOCOL 417
JIAXIN PAN, LIBIN WANG, AND CHANGSHE MA
ANOTHER ELLIPTIC CURVE MODEL FOR FASTER PAIRING COMPUTATION 432 LIJUN
ZHANG, KUNPENG WANG, HONG WANG, AND DINGFENG YE
AUTHOR INDEX 447 |
any_adam_object | 1 |
author_GND | (DE-588)133921492 |
building | Verbundindex |
bvnumber | BV037413207 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f DAT 050f |
ctrlnum | (OCoLC)844921343 (DE-599)DNB1011288346 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037413207</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110803</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110523s2011 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N20</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1011288346</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642210303</subfield><subfield code="c">kart. : EUR 66.34 (DE) (freier Pr.), ca. sfr 89.00 (freier Pr.)</subfield><subfield code="9">978-3-642-21030-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642210309</subfield><subfield code="9">3-642-21030-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642210303</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80062661</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)844921343</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1011288346</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security practice and experience</subfield><subfield code="b">7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings</subfield><subfield code="c">Feng Bao ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 448 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6672</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Kanton Stadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bao, Feng</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)133921492</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISPEC</subfield><subfield code="n">7</subfield><subfield code="d">2011</subfield><subfield code="c">Kanton, Stadt</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16157542-0</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Information Security Practice and Experience</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6672</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6672</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3713531&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022565617&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022565617</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Kanton Stadt gnd-content |
genre_facet | Konferenzschrift 2011 Kanton Stadt |
id | DE-604.BV037413207 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:42Z |
institution | BVB |
institution_GND | (DE-588)16157542-0 |
isbn | 9783642210303 3642210309 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022565617 |
oclc_num | 844921343 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XIII, 448 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings Feng Bao ... (eds.) Berlin [u.a.] Springer 2011 XIII, 448 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6672 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Kanton Stadt gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Zugriffskontrolle (DE-588)4293034-0 s Sicherheitsprotokoll (DE-588)4709127-7 s Bao, Feng Sonstige (DE-588)133921492 oth ISPEC 7 2011 Kanton, Stadt Sonstige (DE-588)16157542-0 oth Erscheint auch als Online-Ausgabe Information Security Practice and Experience Lecture notes in computer science 6672 (DE-604)BV000000607 6672 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3713531&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022565617&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings |
title_auth | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings |
title_exact_search | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings |
title_full | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings Feng Bao ... (eds.) |
title_fullStr | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings Feng Bao ... (eds.) |
title_full_unstemmed | Information security practice and experience 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings Feng Bao ... (eds.) |
title_short | Information security practice and experience |
title_sort | information security practice and experience 7th international conference ispec 2011 guangzhou china may 30 june 1 2011 proceedings |
title_sub | 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Datensicherung Zugriffskontrolle Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Konferenzschrift 2011 Kanton Stadt |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3713531&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022565617&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT baofeng informationsecuritypracticeandexperience7thinternationalconferenceispec2011guangzhouchinamay30june12011proceedings AT ispeckantonstadt informationsecuritypracticeandexperience7thinternationalconferenceispec2011guangzhouchinamay30june12011proceedings |