Information security: 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
7001 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIII, 388 S. graph. Darst. |
ISBN: | 9783642248603 3642248608 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039639963 | ||
003 | DE-604 | ||
005 | 20111212 | ||
007 | t| | ||
008 | 111017s2011 xx d||| |||| 10||| eng d | ||
015 | |a 11,N40 |2 dnb | ||
016 | 7 | |a 101558067X |2 DE-101 | |
020 | |a 9783642248603 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-24860-3 | ||
020 | |a 3642248608 |9 3-642-24860-8 | ||
024 | 3 | |a 9783642248603 | |
028 | 5 | 2 | |a Best.-Nr.: 80123955 |
035 | |a (OCoLC)760134841 | ||
035 | |a (DE-599)DNB101558067X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Information security |b 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings |c Xuejia Lai ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIII, 388 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7001 | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Xi'an |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 4 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 2 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | 3 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Lai, Xuejia |e Sonstige |4 oth | |
711 | 2 | |a ISC |n 14 |d 2011 |c Xi'an |j Sonstige |0 (DE-588)16326176-3 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Information Security |
830 | 0 | |a Lecture notes in computer science |v 7001 |w (DE-604)BV000000607 |9 7001 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024489883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024489883 |
Datensatz im Suchindex
_version_ | 1820875354606141440 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
ATTACKS REPLACEMENT ATTACKS ON BEHAVIOR BASED SOFTWARE BIRTHMARK 1 ZHI
XIN, HUIYU CHEN, XINCHE WANG, PENG LIU, SENCUN ZHU, BING MAO, AND LI XIE
ATTACKING TRAITOR TRACING SCHEMES USING HISTORY RECORDING AND ABRUPT
DECODERS 17
AGGELOS KIAYIAS AND SERDAR PEHLIVANOGLU
HOW TO FIND SHORT RC4 COLLIDING KEY PAIRS 32
JIAGENG CHEN AND ATSUKO MIYAJI
PROTOCOLS
A FORMAL APPROACH TO DISTANCE-BOUNDING RFID PROTOCOLS 47 ULRICH DUERHOLZ,
MARC FISCHLIN, MICHAEL KASPER, AND CRISTINA ONETE
MASHA - LOW COST AUTHENTICATION WITH A NEW STREAM CIPHER 63 SHINSAKU
KIYOMOTO, MATT HENRICKSEN, WUN-SHE YAP, YUTO NAKANO, AND KAZUHIDE
FUKUSHIMA
TOWARD PAIRING-FREE CERTIFICATELESS AUTHENTICATED KEY EXCHANGES 79 EU
XIONG, QIANHONG WU, AND ZHONG CHEN
PUBLIC-KEY CRYPTOSYSTEMS
SECURITY ANALYSIS OF AN RSA KEY GENERATION ALGORITHM WITH A LARGE
PRIVATE KEY 95
FANYU KONG, JIA YU, AND LEI WU
ADAPTIVE SECURE-CHANNEL FREE PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH
IMPLIES TIMED RELEASE ENCRYPTION 102
KEITA EMURA, ATSUKO MIYAJI, AND KAZUMASA OMOTE
THE N-DIFNE-HELLMAN PROBLEM AND ITS APPLICATIONS 119
LIQUN CHEN AND YU CHEN
NETWORK SECURITY
RATBOT ANTI-ENUMERATION PEER-TO-PEER BOTNETS 135
GUANHUA YAN, SONGQING CHEN, AND STEPHAN EIDENBENZ
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/101558067X
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
DETECTING NEAR-DUPLICATE SPITS IN VOICE MAILBOXES USING HASHES 152 GE
ZHANG AND SIMONE FIS CHER-HUEBNER
SOFTWARE SECURITY
MULTI-STAGE BINARY CODE OBFUSCATION USING IMPROVED VIRTUAL MACHINE 168
HUI FANG, YONGDONG WU, SHUHONG WANG, AND YIN HUANG
DETECTION AND ANALYSIS OF CRYPTOGRAPHIC DATA INSIDE SOFTWARE 182 RUOXU
ZHAO, DAWU GU, JUANRU LI, AND RAN YU
SYSTEM SECURITY
SUDO WEB: MINIMIZING INFORMATION DISCLOSURE TO THIRD PARTIES IN SINGLE
SIGN-ON PLATFORMS 197
GEORGIOS KONTAXIS, MICHAIIS POLYCHRONAKIS, AND EVANGELOS P. MARKATOS
HELLO ROOTKITTY: A LIGHTWEIGHT INVARIANCE-ENFORCING FRAMEWORK 213
FRANCESCO GADALETA, NICK NIKIFORAKIS, YVES YOUNAN, AND WOUTER JOOSEN
OPACITY ANALYSIS IN TRUST MANAGEMENT SYSTEMS 229
MORITZ Y. BECKER AND MASOUD KOLEINI
DATABASE SECURITY
ON THE INFERENCE-PROOFNESS OF DATABASE FRAGMENTATION SATISFYING
CONFIDENTIALITY CONSTRAINTS 246
JOACHIM BISKUP, MARCEL PREUSS, AND LENA WIESE
ROUND-EFFICIENT OBLIVIOUS DATABASE MANIPULATION 262
SVEN LAUR, JAN WILLEMSON, AND BINGSHENG ZHANG
A PRIVACY-PRESERVING JOIN ON OUTSOURCED DATABASE 278
SHA MA, BO YANG, KANGSHUN LI, AND FENG XIA
PRIVACY
APPA: AGGREGATE PRIVACY-PRESERVING AUTHENTICATION IN VEHICULAR AD HOC
NETWORKS 293
LEI ZHANG, QIANHONG WU, BO QIN, AND JOSEP DOMINGO-FERRER
ASSESSING LOCATION PRIVACY IN MOBILE COMMUNICATION NETWORKS 309 KLAUS
RECHERT, KONRAD MEIER, BENJAMIN GRESCHBACH, DENNIS WEHRLE, AND DIRK VON
SUCHODOLETZ
IMAGE 3
TABLE OF CONTENTS XIII
HOW MUCH IS ENOUGH? CHOOSING E FOR DIFFERENTIAL PRIVACY 325
JAEWOO LEE AND CHRIS CLIFTON
DIGITAL SIGNATURES
NON-INTERACTIVE CDH-BASED MULTISIGNATURE SCHEME IN THE PLAIN PUBLIC KEY
MODEL WITH TIGHTER SECURITY 341
YUAN ZHOU, HAIFENG QIAN, AND XIANGXUE LI
AN EFFICIENT CONSTRUCTION OF TIME-SELECTIVE CONVERTIBLE UNDENIABLE
SIGNATURES 355
QIONG HUANG, DUNCAN S. WONG, WILLY SUSILO, AND BO YANG
EFFICIENT FAIL-STOP SIGNATURES FROM THE FACTORING ASSUMPTION 372 ATEFEH
MASHATAN AND KHALED OUAFI
AUTHOR INDEX 387 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV039639963 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f DAT 050f |
ctrlnum | (OCoLC)760134841 (DE-599)DNB101558067X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039639963</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111212</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">111017s2011 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N40</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">101558067X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642248603</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-24860-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642248608</subfield><subfield code="9">3-642-24860-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642248603</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80123955</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)760134841</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB101558067X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings</subfield><subfield code="c">Xuejia Lai ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 388 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7001</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Xi'an</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lai, Xuejia</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISC</subfield><subfield code="n">14</subfield><subfield code="d">2011</subfield><subfield code="c">Xi'an</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16326176-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Information Security</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7001</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7001</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024489883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024489883</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Xi'an gnd-content |
genre_facet | Konferenzschrift 2011 Xi'an |
id | DE-604.BV039639963 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:17Z |
institution | BVB |
institution_GND | (DE-588)16326176-3 |
isbn | 9783642248603 3642248608 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024489883 |
oclc_num | 760134841 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIII, 388 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings Xuejia Lai ... (eds.) Berlin [u.a.] Springer 2011 XIII, 388 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7001 Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Xi'an gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Authentifikation (DE-588)4330656-1 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Elektronische Unterschrift (DE-588)4269037-7 s Lai, Xuejia Sonstige oth ISC 14 2011 Xi'an Sonstige (DE-588)16326176-3 oth Erscheint auch als Online-Ausgabe Information Security Lecture notes in computer science 7001 (DE-604)BV000000607 7001 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024489883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings Lecture notes in computer science Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4269037-7 (DE-588)7562931-8 (DE-588)1071861417 |
title | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings |
title_auth | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings |
title_exact_search | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings |
title_full | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings Xuejia Lai ... (eds.) |
title_fullStr | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings Xuejia Lai ... (eds.) |
title_full_unstemmed | Information security 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings Xuejia Lai ... (eds.) |
title_short | Information security |
title_sort | information security 14th international conference isc 2011 xi an china october 26 29 2011 proceedings |
title_sub | 14th international conference, ISC 2011 ; Xi'an, China, October 26 - 29, 2011 ; proceedings |
topic | Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Datensicherung Authentifikation Privatsphäre Elektronische Unterschrift Trusted Computing Konferenzschrift 2011 Xi'an |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024489883&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT laixuejia informationsecurity14thinternationalconferenceisc2011xianchinaoctober26292011proceedings AT iscxian informationsecurity14thinternationalconferenceisc2011xianchinaoctober26292011proceedings |