Secure IT systems: 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7617 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | X, 246 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 3642342094 9783642342097 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040508138 | ||
003 | DE-604 | ||
005 | 20130215 | ||
007 | t| | ||
008 | 121029s2012 gw ad|| |||| 10||| eng d | ||
015 | |a 12,N38 |2 dnb | ||
016 | 7 | |a 102599051X |2 DE-101 | |
020 | |a 3642342094 |9 3-642-34209-4 | ||
020 | |a 9783642342097 |c Print |9 978-3-642-34209-7 | ||
024 | 3 | |a 9783642342097 | |
028 | 5 | 2 | |a Best.-Nr.: 86164223 |
035 | |a (OCoLC)816344277 | ||
035 | |a (DE-599)DNB102599051X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Secure IT systems |b 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings |c Audun Jøsang ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a X, 246 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7617 | |
650 | 0 | 7 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a World Wide Web |0 (DE-588)4363898-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Karlskrona |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a World Wide Web |0 (DE-588)4363898-3 |D s |
689 | 0 | 5 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 6 | |a Kritische Informationsinfrastruktur |0 (DE-588)7636254-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jøsang, Audun |e Sonstige |4 oth | |
711 | 2 | |a NordSec |n 17 |d 2012 |c Karlskrona |j Sonstige |0 (DE-588)1027270247 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-34210-3 |
830 | 0 | |a Lecture notes in computer science |v 7617 |w (DE-604)BV000000607 |9 7617 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4122318&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025354728&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025354728 |
Datensatz im Suchindex
_version_ | 1820875432015167488 |
---|---|
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
APPLICATION S E C U R I T Y
DESIGNED T O FAIL: A USB-CONNECTED READER FOR ONLINE BANKING 1
A R J A N BLOM, GERHARD DE K O N I N G GANS, E R I K POLL,
JOERI DE RUITER, A N D ROEL VERDULT
SECURITY ADD-ONS FOR MOBILE PLATFORMS 17
BENJAMIN ADOLPHI A N D HANNO LARIGWEG
THAPS: AUTOMATED VULNERABILITY SCANNING OF P H P APPLICATIONS 31 TORBEN
JENSEN, HEINE PEDERSEN, M A D S CHR. OLESEN, AND R E N E R Y D H O F H A
N S E N
S E C U R I T Y M A N A G E M E N T
CYBER SECURITY EXERCISES AND COMPETITIONS AS A PLATFORM FOR CYBER
SECURITY EXPERIMENTS 47
TEODOR S O M M E S T A D AND JONAS HALLBERG
T H E DEVELOPMENT OF CYBER SECURITY WARNING, ADVICE AND REPORT POINTS 61
TONY PROCTOR
TOWARDS AN EMPIRICAL EXAMINATION OF I T SECURITY INFRASTRUCTURES IN SME
73
R A M O N A GRONER A N D PHILIPP B R U N E
HOW T O SELECT A SECURITY REQUIREMENTS METHOD? A COMPARATIVE STUDY WITH
STUDENTS AND PRACTITIONERS 89
FABIO MASSACCI AND FEDERICA P A D
S Y S T E M S E C U R I T Y
THERE IS SAFETY IN NUMBERS: PREVENTING CONTROL-FLOW HIJACKING BY
DUPLICATION 105
JOB NOORMAN, N I C K NIKIFORAKIS, A N D FRANK PIESSENS
COINDUCTIVE UNWINDING OF SECURITY-RELEVANT HYPERPROPERTIES 121
DIMITER MILUSHEV AND DAVE CLARKE
RETOOLING AND SECURING SYSTEMIC DEBUGGING 137
B J O M ST&HL A N D P E R MELLSTRAND
HTTP://D-NB.INFO/102599051X
IMAGE 2
X TABLE OF CONTENTS
N E T W O R K S E C U R I T Y
CRACKING ASSOCIATIVE PASSWORDS 153
KIRSI HELKALA. NILS KALSTAD SVENDSEN. P E R THORSHEIM, AND A N D E R S
WIEHE
A HYBRID APPROACH FOR HIGHLY AVAILABLE AND SECURE STORAGE OF PSEUDO-SSO
CREDENTIALS 169
J A N ZIBUSCHKA AND LOTHAR FRITSCH
ASSESSING THE QUALITY OF PACKET-LEVEL TRACES COLLECTED ON INTERNET
BACKBONE LINKS 184
BEHROOZ SANGCHOOLIE, MAZDAK RAJABI NASAB, TOMAS OLOVSSON, AND WOLFGANG J
O H N
T R U S T M A N A G E M E N T
EVERYTHING BUT THE KITCHEN SINK: DETERMINING THE EFFECT OF MULTIPLE
ATTACKS ON PRIVACY PRESERVING TECHNOLOGY USERS 199
JASON W. CLARK
CAN WE IDENTIFY MANIPULATIVE BEHAVIOR AND THE CORRESPONDING SUSPECTS ON
REVIEW WEBSITES USING SUPERVISED LEARNING? 215
HUIYING D U A N AND CACILIA Z I R N
PRIVACY-FRIENDLY CLOUD STORAGE FOR THE D A T A TRACK: AN EDUCATIONAL
TRANSPARENCY TOOL 231
TOBIAS PULLS
A U T H O R I N D E X 247 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040508138 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 050f |
ctrlnum | (OCoLC)816344277 (DE-599)DNB102599051X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040508138</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130215</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121029s2012 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">102599051X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642342094</subfield><subfield code="9">3-642-34209-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642342097</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-642-34209-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642342097</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86164223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)816344277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB102599051X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure IT systems</subfield><subfield code="b">17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings</subfield><subfield code="c">Audun Jøsang ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 246 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7617</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Karlskrona</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">World Wide Web</subfield><subfield code="0">(DE-588)4363898-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Kritische Informationsinfrastruktur</subfield><subfield code="0">(DE-588)7636254-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jøsang, Audun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">NordSec</subfield><subfield code="n">17</subfield><subfield code="d">2012</subfield><subfield code="c">Karlskrona</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1027270247</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-34210-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7617</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7617</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4122318&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025354728&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025354728</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Karlskrona gnd-content |
genre_facet | Konferenzschrift 2012 Karlskrona |
id | DE-604.BV040508138 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:31Z |
institution | BVB |
institution_GND | (DE-588)1027270247 |
isbn | 3642342094 9783642342097 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025354728 |
oclc_num | 816344277 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | X, 246 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings Audun Jøsang ... (eds.) Berlin [u.a.] Springer 2012 X, 246 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7617 Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Mobile Computing (DE-588)4694120-4 gnd rswk-swf World Wide Web (DE-588)4363898-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Karlskrona gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Privatsphäre (DE-588)4123980-5 s World Wide Web (DE-588)4363898-3 s Mobile Computing (DE-588)4694120-4 s Kritische Informationsinfrastruktur (DE-588)7636254-1 s DE-604 Jøsang, Audun Sonstige oth NordSec 17 2012 Karlskrona Sonstige (DE-588)1027270247 oth Erscheint auch als Online-Ausgabe 978-3-642-34210-3 Lecture notes in computer science 7617 (DE-604)BV000000607 7617 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4122318&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025354728&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings Lecture notes in computer science Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Mobile Computing (DE-588)4694120-4 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7636254-1 (DE-588)4011144-1 (DE-588)4123980-5 (DE-588)4694120-4 (DE-588)4363898-3 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings |
title_auth | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings |
title_exact_search | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings |
title_full | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings Audun Jøsang ... (eds.) |
title_fullStr | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings Audun Jøsang ... (eds.) |
title_full_unstemmed | Secure IT systems 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings Audun Jøsang ... (eds.) |
title_short | Secure IT systems |
title_sort | secure it systems 17th nordic conference nordsec 2012 karlskrona sweden october 31 november 2 2012 proceedings |
title_sub | 17th Nordic conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012 ; proceedings |
topic | Kritische Informationsinfrastruktur (DE-588)7636254-1 gnd Datensicherung (DE-588)4011144-1 gnd Privatsphäre (DE-588)4123980-5 gnd Mobile Computing (DE-588)4694120-4 gnd World Wide Web (DE-588)4363898-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kritische Informationsinfrastruktur Datensicherung Privatsphäre Mobile Computing World Wide Web Kryptoanalyse Computersicherheit Konferenzschrift 2012 Karlskrona |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4122318&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025354728&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT jøsangaudun secureitsystems17thnordicconferencenordsec2012karlskronaswedenoctober31november22012proceedings AT nordseckarlskrona secureitsystems17thnordicconferencenordsec2012karlskronaswedenoctober31november22012proceedings |