Decision and game theory for security: second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
7037 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | X, 257 S. graph. Darst. 24 cm |
ISBN: | 3642252796 9783642252792 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039693101 | ||
003 | DE-604 | ||
005 | 20111213 | ||
007 | t | ||
008 | 111110s2011 d||| |||| 10||| eng d | ||
015 | |a 11,N42 |2 dnb | ||
016 | 7 | |a 1016104944 |2 DE-101 | |
020 | |a 3642252796 |9 3-642-25279-6 | ||
020 | |a 9783642252792 |c kart. : EUR 49.22 |9 978-3-642-25279-2 | ||
024 | 3 | |a 9783642252792 | |
028 | 5 | 2 | |a Best.-Nr.: 86007650 |
035 | |a (OCoLC)767772883 | ||
035 | |a (DE-599)DNB1016104944 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a MAT 920f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Decision and game theory for security |b second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings |c John S. Baras ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a X, 257 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7037 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z College Park Md. |2 gnd-content | |
689 | 0 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | 2 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 5 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 6 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Baras, John S. |e Sonstige |4 oth | |
711 | 2 | |a GameSec |n 2 |d 2011 |c College Park, Md. |j Sonstige |0 (DE-588)16329091-X |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-25280-8 |
830 | 0 | |a Lecture notes in computer science |v 7037 |w (DE-604)BV000000607 |9 7037 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3896994&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024541815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024541815 |
Datensatz im Suchindex
_version_ | 1805145530354892800 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
PLENARY KEYNOTES BEYOND NASH EQUILIBRIUM: SOLUTION CONCEPTS FOR THE 21ST
CENTURY 1 JOSEPH Y. HALPERN
NETWORK SECURITY GAMES: COMBINING GAME THEORY, BEHAVIORAL ECONOMICS, AND
NETWORK MEASUREMENTS 4
NICOLAS CHRISTIN
ATTACKS, ADVERSARIES, AND GAME THEORY
INDICES OF POWER IN OPTIMAL IDS DEFAULT CONFIGURATION: THEORY AND
EXAMPLES 7
QUANYAN ZHU AND TAMER BA§AR
EXPLOITING ADVERSARY'S RISK PROFILES IN IMPERFECT INFORMATION SECURITY
GAMES 22
GABRIEL FORTUNATO STOCCO AND GEORGE CYBENKO
WIRELESS ADHOC AND SENSOR NETWORKS
AN ANTI-JAMMING STRATEGY FOR CHANNEL ACCESS IN COGNITIVE RADIO NETWORKS
34
SHABNAM SODAGARI AND T. CHARLES CLANCY
NODE CAPTURE GAMES: A GAME THEORETIC APPROACH TO MODELING AND MITIGATING
NODE CAPTURE ATTACKS 44
TAMARA BONACI AND LINDA BUSHNELL
MULTI-VARIATE QUICKEST DETECTION OF SIGNIFICANT CHANGE PROCESS 56
KRZYSZTOF SZAJOWSKI
NETWORK GAMES
INTERPLAY BETWEEN SECURITY PROVIDERS, CONSUMERS, AND ATTACKERS: A
WEIGHTED CONGESTION GAME APPROACH 67
PATRICK MAILLE, PETER REICHL, AND BRUNO TUFFIN
NETWORK GAMES WITH AND WITHOUT SYNCHRONEITY 87
AHMAD TERMIMI AB GHANI AND KAZUYUKI TANAKA
AN ASYMPTOTIC SOLUTION OF DRESHER'S GUESSING GAME 104
ROBBERT FOKKINK AND MISHA STASSEN
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016104944
DIGITALISIERT DURCH
IMAGE 2
X TABLE OF CONTENTS
SECURITY INSURANCE
SECURITY GAMES WITH MARKET INSURANCE 117
BENJAMIN JOHNSON, RAINER BOEHME, AND JENS GROSSKLAGS
AEGIS: A NOVEL CYBER-INSURANCE MODEL 131
RANJAN PAL, LEANA GOLUBCHIK, AND KONSTANTINOS PSOUNIS
SECURITY AND TRUST IN SOCIAL NETWORKS
MAXIMIZING INFLUENCE IN COMPETITIVE ENVIRONMENTS: A GAME-THEORETIC
APPROACH 151
ANDREW CLARK AND RADHA POOVENDRAN
COLLABORATIVE LOCATION PRIVACY WITH RATIONAL USERS 163
FRANCISCO SANTOS, MATHIAS HUMBERT, REZA SHOKRI, AND JEAN-PIERRE HUBAUX
DIGITAL TRUST GAMES: AN EXPERIMENTAL STUDY 182
TANSU ALPCAN, ALBERT LEVI, AND ERKAY SAVA§
COLONEL BLOTTO IN THE PHISHING WAR 201
PERN HUI CHIA AND JOHN CHUANG
SECURITY INVESTMENTS
INVESTMENT IN PRIVACY-PRESERVING TECHNOLOGIES UNDER UNCERTAINTY 219
MURAT KANTARCIOGLU, ALAIN BENSOUSSAN, AND SINGRU(CELINE) HOE
MODELING INTERNET SECURITY INVESTMENTS: TACKLING TOPOLOGICAL INFORMATION
UNCERTAINTY 239
RANJAN PAL AND PAN HUI
AUTHOR INDEX 259 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV039693101 |
classification_rvk | SS 4800 |
classification_tum | MAT 920f DAT 461f |
ctrlnum | (OCoLC)767772883 (DE-599)DNB1016104944 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039693101</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111213</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111110s2011 d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N42</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016104944</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642252796</subfield><subfield code="9">3-642-25279-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642252792</subfield><subfield code="c">kart. : EUR 49.22</subfield><subfield code="9">978-3-642-25279-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642252792</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86007650</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)767772883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016104944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 920f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decision and game theory for security</subfield><subfield code="b">second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings</subfield><subfield code="c">John S. Baras ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 257 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7037</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">College Park Md.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baras, John S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">GameSec</subfield><subfield code="n">2</subfield><subfield code="d">2011</subfield><subfield code="c">College Park, Md.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16329091-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-25280-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7037</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7037</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3896994&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024541815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024541815</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 College Park Md. gnd-content |
genre_facet | Konferenzschrift 2011 College Park Md. |
id | DE-604.BV039693101 |
illustrated | Illustrated |
indexdate | 2024-07-21T00:15:28Z |
institution | BVB |
institution_GND | (DE-588)16329091-X |
isbn | 3642252796 9783642252792 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024541815 |
oclc_num | 767772883 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | X, 257 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings John S. Baras ... (ed.) Berlin [u.a.] Springer 2011 X, 257 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7037 Literaturangaben Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Spieltheorie (DE-588)4056243-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 College Park Md. gnd-content Netzwerkverwaltung (DE-588)4314339-8 s Netzwerktopologie (DE-588)4208537-8 s Spieltheorie (DE-588)4056243-8 s Kryptoanalyse (DE-588)4830502-9 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Eindringerkennung (DE-588)4706627-1 s DE-604 Baras, John S. Sonstige oth GameSec 2 2011 College Park, Md. Sonstige (DE-588)16329091-X oth Erscheint auch als Online-Ausgabe 978-3-642-25280-8 Lecture notes in computer science 7037 (DE-604)BV000000607 7037 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3896994&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024541815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings Lecture notes in computer science Netzwerktopologie (DE-588)4208537-8 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4208537-8 (DE-588)4056243-8 (DE-588)4123980-5 (DE-588)4706627-1 (DE-588)4830502-9 (DE-588)7562931-8 (DE-588)4314339-8 (DE-588)1071861417 |
title | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings |
title_auth | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings |
title_exact_search | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings |
title_full | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings John S. Baras ... (ed.) |
title_fullStr | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings John S. Baras ... (ed.) |
title_full_unstemmed | Decision and game theory for security second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings John S. Baras ... (ed.) |
title_short | Decision and game theory for security |
title_sort | decision and game theory for security second international conference gamesec 2011 college park maryland usa november 14 15 2011 proceedings |
title_sub | second international conference, GameSec 2011, College Park, Maryland, USA, November 14 - 15, 2011 ; proceedings |
topic | Netzwerktopologie (DE-588)4208537-8 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Netzwerktopologie Spieltheorie Privatsphäre Eindringerkennung Kryptoanalyse Trusted Computing Netzwerkverwaltung Konferenzschrift 2011 College Park Md. |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3896994&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024541815&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT barasjohns decisionandgametheoryforsecuritysecondinternationalconferencegamesec2011collegeparkmarylandusanovember14152011proceedings AT gameseccollegeparkmd decisionandgametheoryforsecuritysecondinternationalconferencegamesec2011collegeparkmarylandusanovember14152011proceedings |