Information security practice and experience: 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7232 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 406 S. graph. Darst. 24 cm |
ISBN: | 9783642291005 3642291007 9783642291012 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040035372 | ||
003 | DE-604 | ||
005 | 20230111 | ||
007 | t| | ||
008 | 120410s2012 xx d||| |||| 10||| eng d | ||
015 | |a 12,N10 |2 dnb | ||
015 | |a 12,A15 |2 dnb | ||
016 | 7 | |a 1020159367 |2 DE-101 | |
020 | |a 9783642291005 |c kart. : EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.) |9 978-3-642-29100-5 | ||
020 | |a 3642291007 |9 3-642-29100-7 | ||
020 | |a 9783642291012 |c eISBN |9 978-3-642-29101-2 | ||
024 | 3 | |a 9783642291005 | |
028 | 5 | 2 | |a Best.-Nr.: 86081977 |
035 | |a (OCoLC)799085859 | ||
035 | |a (DE-599)DNB1020159367 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 |a DE-91G |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Information security practice and experience |b 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings |c Mark D. Ryan ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XIII, 406 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7232 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Hangzhou |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 2 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Ryan, Mark |d 1962- |e Sonstige |0 (DE-588)114330468 |4 oth | |
711 | 2 | |a ISPEC |n 8 |d 2012 |c Hangzhou |j Sonstige |0 (DE-588)16345651-3 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Information Security Practice and Experience |
830 | 0 | |a Lecture notes in computer science |v 7232 |w (DE-604)BV000000607 |9 7232 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3984999&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024892183&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024892183 |
Datensatz im Suchindex
_version_ | 1820875380045643776 |
---|---|
adam_text |
IMAGE 1
T A B L E O F C O N T E N T S
DIGITAL S I G N A T U R E S A PRE-COMPUTABLE SIGNATURE SCHEME WITH
EFFICIENT VERIFICATION FOR RFID 1
FUCHUN GUO. YI MU, WILLY SUSILO, AND VIJAY VARADHARAJAN
REDACTABLE SIGNATURES FOR INDEPENDENT REMOVAL OF STRUCTURE AND CONTENT
17
KAI SAMELIN, HENRICH C. PDHLS, ARNE BILZHAUSE, JOACHIM POSEGGA, AND
HERMANN DE MEER
P U B L I C K E Y C R Y P T O G R A P H Y
IMPROVED EFFICIENCY OF CHOSEN CIPHERTEXT SECURE ENCRYPTION FROM
FACTORING 34
XIANHUI LU. BAO LI. QIXIANG MEI, AND YAMIN LIU
DENIABLE ENCRYPTIONS SECURE AGAINST ADAPTIVE CHOSEN CIPHERTEXT ATTACK 46
CHONG-ZKI, GAO, DONGQING XIE, AND BAODIAN WEI
COMPUTATIONAL SOUNDNESS OF INDISTINGUISLIABILITY PROPERTIES WITHOUT
COMPUTABLE PARSING 63
HUBERT COMON-LUNDH, MAS AMI HAGIYA, YUSUKE KAWAMOTO, AND HIDEKI SAKURADA
C R Y P T A N A L Y S I S I: DIFFERENTIAL A T T A C K S
NEW IMPOSSIBLE DIFFERENTIAL ATTACKS ON CAMELLIA 80
DONGXIA BAI AND LEIBO L I
IMPOSSIBLE DIFFERENTIAL ATTACKS ON REDUCED-ROUND LBLOCK 97
YA LIU, DAWU GU, ZHIQIANG LIU. AND WEI L I
NEW TRUNCATED DIFFERENTIAL CRYPTANALYSIS ON 3D BLOCK CIPHER 109
TAKUMA KOYAMA, LEI WANG, YU SASAKI, KAZUO SAKIYAMA, AND KAZUO OHTA
A P P L I C A T I O N S I.I: OBLIVIOUS T R A N S F E R
T-OUT-OF-N DISTRIBUTED OBLIVIOUS TRANSFER PROTOCOLS IN NON-ADAPTIVE AND
ADAPTIVE SETTINGS 126
CHRISTIAN L.F. CORNIAUX AND HOSSEIN GHODOSI
HTTP://D-NB.INFO/1020159367
IMAGE 2
X I I T A B L E O F C O N T E N T S
A CODE-BASED 1-OUT-OF-N OBLIVIOUS TRANSFER BASED ON MCELIECE ASSUMPTIONS
144
PREETHA MATHEW K., SACHIN VASANT, SRIDHAR VENKATESAN, AND C. PANDU
RANGAN
A P P L I C A T I O N S I.II: I N T E R N E T S E C U R I T Y ( W O R K
S - I N - P R O G R E S S )
TOWARDS FINE-GRAINED ACCESS CONTROL ON BROWSER EXTENSIONS 158
LEI WANG, JI XIANG, JIWU JING, AND LINGCHEN ZHANG
ENHANCED STE3D-CAP: A NOVEL 3D CAPTCHA FAMILY 170
YANG-WAI CHOW AND WILLY SUSILO
K E Y M A N A G E M E N T
HIGH-ENTROPY VISUAL IDENTIFICATION FOR TOUCH SCREEN DEVICES 182
NATHANIEL WESLEY FILARDO AND GIUSEPPE ATENIESE
A FRAMEWORK FOR SECURITY ANALYSIS OF KEY DERIVATION FUNCTIONS 199 CHUAH
CHAI WEN, EDWARD DAWSON, JUAN MANUEL GONZALEZ NIETO, AND LEONIE SIMPSON
A P P L I E D C R Y P T O G R A P H Y
ON THE EQUIVALENCE OF TWO DEFINITIONS OF VISUAL CRYPTOGRAPHY SCHEME 217
TENG GUO, FENG LIU, AND CHUANKUN WU
KEY LENGTH ESTIMATION OF PAIRING-BASED CRYPTOSYSTEMS USING Q R PAIRING
228
NAOYUKI SHINOHARA, TAKESHI SHIMOYAMA, TAKUYA HAYASHI, AND TSUYOSHI
TAKAGI
LIGHTWEIGHT INTEGRITY FOR X O R NETWORK CODING IN WIRELESS SENSOR
NETWORKS 245
KAZUYA IZAWA, ATSUKO MIYAJI, AND KAZUMASA ORNOTE
A P P L I C A T I O N S II.I: P I N S
IPIN AND MTAN FOR SECURE ELD APPLICATIONS 259
JOHANNES BRAUN, MORITZ HORSCH, AND ALEXANDER WIESMAIER
IMAGE 3
T A B L E O F C O N T E N T S XIII
A P P L I C A T I O N S II.II: F U N D A M E N T A L S ( W O R K S - I N
- P R O G R E S S )
SECURE DISTRIBUTED COMPUTATION OF THE SQUARE ROOT AND APPLICATIONS 277
MANUEL LIECLEL
PREVENT KERNEL RETURN-ORIENTED PROGRAMMING ATTACKS USING HARDWARE
VISUALIZATION 289
TIAN SHUO. HE YEPING, AND, DING BAOZENG
C R Y P T A N A L Y S I S II: F A U L T A T T A C K S A N D K E Y R E C
O V E R Y
STRUCTURE-BASED RSA FAULT ATTACKS 301
BENJAMIN MICHELE, JULIANE KRAMER, AND JEAN-PIERRE SEIFERT
FAULT ANALYSIS OF THE KATAN FAMILY OF BLOCK CIPHERS 319
SHEKH FAISAL ABDUL-LATIP, MOHAMMAD REZA REYHANITABAR, WILLY SUSILO, AND
JENNIFER SEBERRY
BICLIQUE CRYPTANALYSIS OF REDUCED-ROUND PICCOLO BLOCK CIPHER 337 YANFENG
WANG, WENLING WU, AND XIAOLI YU
ON THE CCA-1 SECURITY OF SOMEWHAT HOMOMORPHIC ENCRYPTION OVER THE
INTEGERS 353
ZHENFEI ZHANG, THOMAS PLANTARD, AND WILLY SUSILO
C R Y P T A N A L Y S I S I I I : K E Y R E C O V E R Y ( W O R K S - I
N - P R O G R E S S )
PARTIAL KEY EXPOSURE ON RSA WITH PRIVATE EXPONENTS LARGER THAN N 369
MARC JOYE AND TANCRETDE LEPOINT
LINEAR CRYPTANALYSIS OF REDUCED-ROUND ICEBERG 381
YUE SUN AND MEIQIN WANG
OVERCOMING SIGNIFICANT NOISE: CORRELATION-TEMPLATE-INDUCTION ATTACK 393
A N WANG, MAN CHEN, ZONGYUE WANG, AND YAOLING DING
A U T H O R I N D E X 405 |
any_adam_object | 1 |
author_GND | (DE-588)114330468 |
building | Verbundindex |
bvnumber | BV040035372 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)799085859 (DE-599)DNB1020159367 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040035372</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230111</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120410s2012 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N10</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,A15</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1020159367</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642291005</subfield><subfield code="c">kart. : EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-29100-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642291007</subfield><subfield code="9">3-642-29100-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642291012</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-29101-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642291005</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86081977</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)799085859</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1020159367</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security practice and experience</subfield><subfield code="b">8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings</subfield><subfield code="c">Mark D. Ryan ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 406 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7232</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Hangzhou</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ryan, Mark</subfield><subfield code="d">1962-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)114330468</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISPEC</subfield><subfield code="n">8</subfield><subfield code="d">2012</subfield><subfield code="c">Hangzhou</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16345651-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Information Security Practice and Experience</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7232</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7232</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3984999&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024892183&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024892183</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Hangzhou gnd-content |
genre_facet | Konferenzschrift 2012 Hangzhou |
id | DE-604.BV040035372 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:43Z |
institution | BVB |
institution_GND | (DE-588)16345651-3 |
isbn | 9783642291005 3642291007 9783642291012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024892183 |
oclc_num | 799085859 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
physical | XIII, 406 S. graph. Darst. 24 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings Mark D. Ryan ... (eds.) Berlin [u.a.] Springer 2012 XIII, 406 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7232 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Hangzhou gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Schlüsselverwaltung (DE-588)4625230-7 s DE-604 Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Ryan, Mark 1962- Sonstige (DE-588)114330468 oth ISPEC 8 2012 Hangzhou Sonstige (DE-588)16345651-3 oth Erscheint auch als Online-Ausgabe Information Security Practice and Experience Lecture notes in computer science 7232 (DE-604)BV000000607 7232 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3984999&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024892183&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4625230-7 (DE-588)1071861417 |
title | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings |
title_auth | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings |
title_exact_search | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings |
title_full | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings Mark D. Ryan ... (eds.) |
title_fullStr | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings Mark D. Ryan ... (eds.) |
title_full_unstemmed | Information security practice and experience 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings Mark D. Ryan ... (eds.) |
title_short | Information security practice and experience |
title_sort | information security practice and experience 8th international conference ispec 2012 hangzhou china april 9 12 2012 proceedings |
title_sub | 8th international conference, ISPEC 2012, Hangzhou, China, April 9 - 12, 2012 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd |
topic_facet | Datensicherung Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Schlüsselverwaltung Konferenzschrift 2012 Hangzhou |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3984999&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024892183&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT ryanmark informationsecuritypracticeandexperience8thinternationalconferenceispec2012hangzhouchinaapril9122012proceedings AT ispechangzhou informationsecuritypracticeandexperience8thinternationalconferenceispec2012hangzhouchinaapril9122012proceedings |