Computer security - ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture Notes in Computer Science
7459 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XVII, 896 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 3642331661 9783642331664 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040442160 | ||
003 | DE-604 | ||
005 | 20130115 | ||
007 | t| | ||
008 | 120926s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N33 |2 dnb | ||
016 | 7 | |a 1024863964 |2 DE-101 | |
020 | |a 3642331661 |9 3-642-33166-1 | ||
020 | |a 9783642331664 |c Pb. : ca. EUR 101.65 (DE) (freier Pr.), ca. EUR 104.50 (AT) (freier Pr.), ca. sfr 126.50 (freier Pr.) |9 978-3-642-33166-4 | ||
024 | 3 | |a 9783642331664 | |
028 | 5 | 2 | |a Best.-Nr.: 86155287 |
035 | |a (OCoLC)815931959 | ||
035 | |a (DE-599)DNB1024863964 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
111 | 2 | |a ESORICS |n 17 |d 2012 |c Pisa |j Verfasser |0 (DE-588)1026291518 |4 aut | |
245 | 1 | 0 | |a Computer security - ESORICS 2012 |b 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings |c Sara Foresti ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XVII, 896 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 7459 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Pisa |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Foresti, Sara |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-33167-1 |
830 | 0 | |a Lecture Notes in Computer Science |v 7459 |w (DE-604)BV000000607 |9 7459 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4096313&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025289973&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025289973 |
Datensatz im Suchindex
_version_ | 1820875420837347328 |
---|---|
adam_text |
IMAGE 1
T A B L E O F C O N T E N T S
SECURITY A N D D A T A P R O T E C T I O N I N R E A L S Y S T E M S
MODELING AND ENHANCING ANDROID'S PERMISSION SYSTEM 1
EM FRAGKAKI, LUJO BAUER. LIMIN JIA, AND DAVID SWASEY
HARDENING ACCESS CONTROL AND D A T A PROTECTION IN GFS-LIKE FILE SYSTEMS
19
JAMES KELLEY, ROBERTO TARNASSIA, AND NIKOS TRIANDOPOULOS
ATTACK OF THE CLONES: DETECTING CLONED APPLICATIONS ON ANDROID MARKETS
37
JONATHAN CRUSSELL, CLINT GIBLER. AND HAO CHEN
BOOSTING THE PERMISSIVENESS OF DYNAMIC INFORMATION-FLOW TRACKING BY
TESTING 55
ARNAR BIRGISSON, DANIEL HEDIN, AND ANDREI SABELFELD
F O R M A L M O D E L S FOR C R Y P T O G R A P H Y A N D ACCESS C O N T
R O L
EFFECTIVE SYMBOLIC PROTOCOL ANALYSIS VIA EQUATIONAL IRREDUCIBILITY
CONDITIONS 73
SERDAR ERBATUR, SANTIAGO ESCOBAR, DEEPAK KAPUR, ZHIQIANG LIU.
CHRISTOPHER LYNCH, CATHERINE MEADOWS. JOSE MESEGUER. PALIATH NARENDRAN,
SONIA SANTIAGO, AND RALF SASSE
DECIDING EPISTEMIC AND STRATEGIC PROPERTIES OF CRYPTOGRAPHIC PROTOCOLS
91
HENNING SCHNOOR
SATISFIABILITY AND FEASIBILITY IN A RELATIONSHIP-BASED WORKFLOW
AUTHORIZATION MODEL 109
A R I F AKRAM KHAN AND PHILIP W.L. FONG
DECIDING SECURITY FOR A FRAGMENT OF ASLAN 127
SEBASTIAN MODERSHEIM
S E C U R I T Y A N D P R I V A C Y I N M O B I L E A N D W I R E L E S
S
N E T W O R K S
A PROBABILISTIC FRAMEWORK FOR LOCALIZATION OF ATTACKERS IN MANETS . . .
145 MASSIMILIANO ALBANESE, ALESSANDRA DE BENEDICTIS, SUSHIL JAJODIA, AND
PAULO SHAKARIAN
HTTP://D-NB.INFO/1024863964
IMAGE 2
XIV
TABLE OF CONTENTS
ROBUST PROBABILISTIC FAKE PACKET INJECTION FOR RECEIVER-LOCATION PRIVACY
IN WSN 163
RUBEN RIOS, JORGE CUELLAR, AND JAVIER LOPEZ
PRIVACY-AWARE MESSAGE EXCHANGES FOR GEOGRAPHICALLY ROUTED HUMAN MOVEMENT
NETWORKS 181
ADAM J. AVIV, MICAH SHERR, MATT BLAZE, AND JONATHAN M. SMITH
C O U N T E R A C T I N G M A N - I N - T H E - M I D D L E A T T A C K
S
TRUST NO ONE ELSE: DETECTING MITM ATTACKS AGAINST SSL/TLS WITHOUT
THIRD-PARTIES 199
HALO DACOSTA, MUSTAQUE AHAMAD, AND PATRICK TRAYNOR
X.509 FORENSICS: DETECTING AND LOCALISING THE SSL/TLS MEN-IN-THE-MIDDLE
217
RALPH HOLZ. THOMAS RIEDMAIER, NILS KAMMENHUBER, AND GEORG CARLE
A PRACTICAL MAN-IN-THE-MIDDLE ATTACK ON SIGNAL-BASED KEY GENERATION
PROTOCOLS 235
SIMON EBERZ, MARTIN STROHMEIER. MATTHIAS WILHELM, AND IVAN MARTINOVIC
N E T W O R K S E C U R I T Y
THE SILENCE OF THE LANS: EFFICIENT LEAKAGE RESILIENCE FOR IPSEC VPNS 253
AHMAD-REZA SADEGHI, STEFFEN SCHULZ, AND VIJAY VARADHARAJAN
SECURITY OF PATCHED DNS 271
A M I R HERZBERG AND HAYA SHULMAN
REVEALING ABUSES OF CHANNEL ASSIGNMENT PROTOCOLS IN MULTI-CHANNEL
WIRELESS NETWORKS: AN INVESTIGATION LOGIC APPROACH 289
QIJUN GU, KYLE JONES, WANYU ZANG, MENG YU, AND PENG LIU
U S E R S P R I V A C Y A N D A N O N Y M I T Y
EXPLORING LINKABILITY OF USER REVIEWS 307
MISHARI ALMISHARI AND GENE TSUDIK
FORMAL ANALYSIS OF PRIVACY IN AN EHEALTH PROTOCOL 325
NAIPENG DONG, HUGO JONKER, AND JUN PANG
PRIVATUS: WALLET-FRIENDLY PRIVACY PROTECTION FOR SMART METERS 343 JINKYU
KOO, XIAOJUN LIN, AND SAURABH BAGCHI
IMAGE 3
TABLE OF CONTENTS
XV
L O C A T I O N P R I V A C Y
SHARP: PRIVATE PROXIMITY TEST AND SECURE HANDSHAKE WITH CHEAT-PROOF
LOCATION TAGS 361
YAO ZHENG, MING LI, WENJING LOU, AND Y. THOMAS HOU
SECURE PROXIMITY DETECTION FOR NFC DEVICES BASED ON AMBIENT SENSOR DATA
379
TZIPORA HALEVI, DI MA, NITESH SAXENA, AND TUO XIANG
ENHANCING LOCATION PRIVACY FOR ELECTRIC VEHICLES (AT THE RIGHT TIME) 397
JOSEPH K. LIU, MAN HO AU, WILLY SUSILO, AND JIANYING ZHOU
DESIGN AND IMPLEMENTATION OF A TERRORIST FRAUD RESILIENT DISTANCE
BOUNDING SYSTEM 415
AANJHAN RANG ANA,THAN. NILS OLE TIPPENHAUER, BORIS SKORIC. DAVE
SINGELEE. AND SRDJAN CAPKUN
V O T I N G P R O T O C O L S A N D A N O N Y M O U S C O M M U N I C A
T I O N
APPLYING DIVERTIBILITY TO BLIND BALLOT COPYING IN THE HELIOS INTERNET
VOTING SYSTEM 433
YVO DESRNEDT, AND PYRROS CHA.IDOS
DEFINING PRIVACY FOR WEIGHTED VOTES. SINGLE AND MULTI-VOTER COERCION 451
JANNIK DREIER, PASCAL LAFOURCADE, AND YASSINE LAKHNECH
TORSCAN: TRACING LONG-LIVED CONNECTIONS AND DIFFERENTIAL SCANNING
ATTACKS 469
ALEX BIRYUKOV, IVAN PUSTOGAROV. AND RALF-PHILIPP WEINMANN
INTRODUCING THE GMIX OPEN SOURCE FRAMEWORK FOR MIX IMPLEMENTATIONS 487
KARL-PETER FUCHS, DOMINIK HERRMANN, AND, HANNES FEDERRATH
P R I V A T E C O M P U T A T I O N I N C L O U D S Y S T E M S
SECURE AND EFFICIENT OUTSOURCING OF SEQUENCE COMPARISONS 505
MARINA BLANTON, MIKHAIL J. ATALLAH, KEITH B. FRIKKEN. AND QUTAIBAH
MALLUHI
THIRD-PARTY PRIVATE DFA EVALUATION ON ENCRYPTED FILES IN THE CLOUD 523
LEI WEI AND MICHAEL K. REITER
NEW ALGORITHMS FOR SECURE OUTSOURCING OF MODULAR EXPONENTIATIONS . . .
541 XIAOFENG CHEN, JIN LI, JIANFENG MA, QIANG TANG, AND WENJING LOU
IMAGE 4
XVI TABLE OF CONTENTS
F O R M A L S E C U R I T Y M O D E L S
TOWARDS SYMBOLIC ENCRYPTION SCHEMES 557
NAVEED AHMED, CHRISTIAN D. JENSEN, AND ERIK ZENNER
DECISION PROCEDURES FOR SIMULATABILITY 573
CHARANJIT S. JUTLA AND ARNAB ROY
MODEL-CHECKING BISIMULATION-BASED INFORMATION FLOW PROPERTIES FOR
INFINITE STATE SYSTEMS 591
DEEPAK D'SOUZA AND K.R. RAGHAVENDRA
I D E N T I T Y B A S E D E N C R Y P T I O N A N D G R O U P S I G N A
T U R E
IDENTITY-BASED TRAITOR TRACING WITH SHORT PRIVATE KEY AND SHORT
CIPHERTEXT 609
FUCHUN GUO, YI MU, AND WILLY SUSILO
IDENTITY-BASED ENCRYPTION WITH MASTER KEY-DEPENDENT MESSAGE SECURITY AND
LEAKAGE-RESILIENCE 627
DAVID GALINDO, JAVIER HERRANZ, AND JORGE VILLAR
UNIQUE GROUP SIGNATURES 643
MATTHEW FRANKLIN AND HAIBIN ZHANG
A U T H E N T I C A T I O N
RELATIONS AMONG NOTIONS OF PRIVACY FOR RFID AUTHENTICATION PROTOCOLS 661
DAISUKE MORIYAMA, SHIN'ICHIRO MATSUO, AND MIYAKO OHKUBO
PE(AR) 2 : PRIVACY-ENHANCED ANONYMOUS AUTHENTICATION WITH REPUTATION AND
REVOCATION 679
K I N YING YU, TSZ HON YUEN, SHERMAN S.M. CHOW, SIU MING YIU. AND LUCAS
C.K. HUI
DISMANTLING ICLASS AND ICLASS ELITE 697
FLAVIO D. GARCIA, GERHARD DE KONING GANS, ROEL VERDULT, AND MILOSCH
MERIAC
E N C R Y P T I O N K E Y A N D P A S S W O R D S E C U R I T Y
EVALUATION OF STANDARDIZED PASSWORD-BASED KEY DERIVATION AGAINST
PARALLEL PROCESSING PLATFORMS 716
MARKUS DILRMUTH, TIM GIINEYSU, MARKUS KASPER, CHRISTOF PAAR, TOLGA
YALCIN, AND RALF ZIMMERMANN
IMAGE 5
TABLE OF CONTENTS XVII
BEYOND ECK: PERFECT FORWARD SECRECY UNDER ACTOR COMPROMISE AND
EPHEMERAL-KEY REVEAL 734
GAS CREMERS AND MICHELE FELTZ
BLEICHENBACHER'S ATTACK STRIKES AGAIN: BREAKING PI CS#1 VL.5 IN XML
ENCRYPTION 752
TIBOR JAGER, SEBASTIAN SCHINZEL. AND JURAJ SOMOROVSKY
ON THE SECURITY OF PASSWORD MANAGER DATABASE FORMATS 770
PAOLO GASTI AND KASPER B. RASMUSSEN
M A L W A R E A N D P H I S H I N G
SCALABLE TELEMETRY CLASSIFICATION FOR AUTOMATED MALWARE DETECTION . . .
. 788 JACK W. STOKES. JOHN C. PIATT, HELEN J. WANG, JOE FAULHABER,
JONATHAN KELLER, MADY MARINESCU, ANIL THOMAS, AND MARIUS GHEORGHESCU
ABSTRACTION-BASED MALWARE ANALYSIS USING REWRITING AND MODEL CHECKING
806
PHILIPPE BEAUCAMPS, ISABELLE GNAEDIG, AND JEAN- YVES MARION
DETECTING PHISHING EMAILS THE NATURAL LANGUAGE WAY 824
RAKESH VERMA, NARASIMHA SHASHIDHAR, AND NABIL HOSSAIN
S O F T W A R E S E C U R I T Y
JVM-PORTABLE SANDBOXING OF JAVA'S NATIVE LIBRARIES 842
MENGTAO SUN AND GANG TAN
CODEJAIL: APPLICATION-TRANSPARENT ISOLATION OF LIBRARIES WITH TIGHT
PROGRAM INTERACTIONS 859
YONGZHENG WU, SAI SATHYANARAYAN, ROLAND H. C. YAP, AND ZHENKAI LIANG
SOCIALIMPACT: SYSTEMATIC ANALYSIS OF UNDERGROUND SOCIAL DYNAMICS 877
ZIMING ZHAO, GAIL-JOON AHN, HONGXIN HU, AND DEEPINDER MAHI
A U T H O R I N D E X 895 |
any_adam_object | 1 |
author_corporate | ESORICS Pisa |
author_corporate_role | aut |
author_facet | ESORICS Pisa |
author_sort | ESORICS Pisa |
building | Verbundindex |
bvnumber | BV040442160 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 461f DAT 465f DAT 050f |
ctrlnum | (OCoLC)815931959 (DE-599)DNB1024863964 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040442160</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130115</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120926s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N33</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1024863964</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642331661</subfield><subfield code="9">3-642-33166-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642331664</subfield><subfield code="c">Pb. : ca. EUR 101.65 (DE) (freier Pr.), ca. EUR 104.50 (AT) (freier Pr.), ca. sfr 126.50 (freier Pr.)</subfield><subfield code="9">978-3-642-33166-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642331664</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86155287</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815931959</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1024863964</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">17</subfield><subfield code="d">2012</subfield><subfield code="c">Pisa</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1026291518</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security - ESORICS 2012</subfield><subfield code="b">17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings</subfield><subfield code="c">Sara Foresti ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 896 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">7459</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Pisa</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foresti, Sara</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-33167-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">7459</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7459</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4096313&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025289973&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025289973</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Pisa gnd-content |
genre_facet | Konferenzschrift 2012 Pisa |
id | DE-604.BV040442160 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:21Z |
institution | BVB |
institution_GND | (DE-588)1026291518 |
isbn | 3642331661 9783642331664 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025289973 |
oclc_num | 815931959 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XVII, 896 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | ESORICS 17 2012 Pisa Verfasser (DE-588)1026291518 aut Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings Sara Foresti ... (eds.) Berlin [u.a.] Springer 2012 XVII, 896 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 7459 Datensicherung (DE-588)4011144-1 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Pisa gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s DE-604 Privatsphäre (DE-588)4123980-5 s Zugriffskontrolle (DE-588)4293034-0 s Kryptologie (DE-588)4033329-2 s Foresti, Sara Sonstige oth Erscheint auch als Online-Ausgabe 978-3-642-33167-1 Lecture Notes in Computer Science 7459 (DE-604)BV000000607 7459 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4096313&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025289973&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings Lecture Notes in Computer Science Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4293034-0 (DE-588)4070085-9 (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings |
title_auth | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings |
title_exact_search | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings |
title_full | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings Sara Foresti ... (eds.) |
title_fullStr | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings Sara Foresti ... (eds.) |
title_full_unstemmed | Computer security - ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings Sara Foresti ... (eds.) |
title_short | Computer security - ESORICS 2012 |
title_sort | computer security esorics 2012 17th european symposium on research in computer security pisa italy september 10 12 2012 proceedings |
title_sub | 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10 - 12, 2012 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Datensicherung Zugriffskontrolle Rechnernetz Privatsphäre Kryptoanalyse Computersicherheit Kryptologie Konferenzschrift 2012 Pisa |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4096313&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025289973&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT esoricspisa computersecurityesorics201217theuropeansymposiumonresearchincomputersecuritypisaitalyseptember10122012proceedings AT forestisara computersecurityesorics201217theuropeansymposiumonresearchincomputersecuritypisaitalyseptember10122012proceedings |