Information security applications: 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7690 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XI, 370 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 3642354157 9783642354151 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040604286 | ||
003 | DE-604 | ||
005 | 20130613 | ||
007 | t| | ||
008 | 121203s2012 gw ad|| |||| 10||| eng d | ||
015 | |a 12,N46 |2 dnb | ||
016 | 7 | |a 102763401X |2 DE-101 | |
020 | |a 3642354157 |9 3-642-35415-7 | ||
020 | |a 9783642354151 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-35415-1 | ||
024 | 3 | |a 9783642354151 | |
028 | 5 | 2 | |a Best.-Nr.: 86192300 |
035 | |a (OCoLC)823231607 | ||
035 | |a (DE-599)DNB102763401X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 055f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information security applications |b 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers |c Dong Hoon Lee ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XI, 370 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7690 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Cheju |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Lee, Dong Hoon |e Sonstige |0 (DE-588)142029742 |4 oth | |
711 | 2 | |a WISA |n 13 |d 2012 |c Jeju |j Sonstige |0 (DE-588)1028511256 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-35416-8 |
830 | 0 | |a Lecture notes in computer science |v 7690 |w (DE-604)BV000000607 |9 7690 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4175173&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431982&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025431982 |
Datensatz im Suchindex
_version_ | 1820875436095176704 |
---|---|
adam_text |
IMAGE 1
TABLE O F C O N T E N T S
SYMMETRIC C I P H E R
SECURITY ON LBLOCK AGAINST BICLIQUE CRYPTANALYSIS 1
YANFENG WANG, WENLING WU, XIAOLI YU, AND LEI ZHANG
IMPROVED IMPOSSIBLE DIFFERENTIAL ATTACKS ON REDUCED-ROUND MISTY1 15
KETING JIA AND LEIBO L I
EFFICIENT PARALLEL EVALUATION OF MULTIVARIATE QUADRATIC POLYNOMIALS ON
GPUS 28
SATOSHI TANAKA, TUNG CHOU, B O - Y I N YANG, CHEN-MOU CHENG, AND KOUICHI
SAKURAI
ENUMERATION OF EVEN-VARIABLE BOOLEAN FUNCTIONS WITH MAXIMUM ALGEBRAIC
IMMUNITY 43
WENTAO ZHAO, X I N HAI, SHAOJING FU, CHAO LI, AND YANFENG WANG
S E C U R E H A R D W A R E / P U B L I C K E Y C R Y P T O A P P L I C
A T I O N
MULTI-PRECISION MULTIPLICATION FOR PUBLIC-KEY CRYPTOGRAPHY ON EMBEDDED
MICROPROCESSORS 55
HWAJEONG SEO AND HOWON K I M
THREE PHASE DYNAMIC CURRENT MODE LOGIC: A MORE SECURE DYCML TO ACHIEVE A
MORE BALANCED POWER CONSUMPTION 68
HYUNMIN KIM, VLADIMIR ROZIC, AND INGRID VERBAUWHEDE
IMPROVED DIFFERENTIAL FAULT ANALYSIS ON BLOCK CIPHER ARIA 82
JEAHOON PARK AND JAECHEOL HA
MULTI-LEVEL CONTROLLED SIGNATURE 96
PAIRAT THORNCHAROENSRI, WILLY S'USILO, AND YI M U
TATE PAIRING COMPUTATION ON GENERALIZED HESSIAN CURVES I L L
LIANGZE L I AND FAN ZHANG
REDUCTION-CENTRIC NON-PROGRAMMABLE SECURITY PROOF FOR THE FULL DOMAIN
HASH IN THE RANDOM ORACLE MODEL 124
MARIO LARANGEIRA AND KEISUKE TANAKA
HTTP://D-NB.INFO/102763401X
IMAGE 2
X TABLE OF CONTENTS
C R Y P T O G R A P H I C P R O T O C O L S / D I G I T A L FORENSICS
AN AUTHENTICATION AND KEY MANAGEMENT SCHEME FOR THE PROXY MOBILE IPV6
144
HYUN-SUN KANG AND CHANG-SEOP PARK
PAYMENT APPROVAL FOR PAYWORD 161
LASZLO ASZALOS AND ANDREA HUSZTI
ANONYMITY-BASED AUTHENTICATED KEY AGREEMENT WITH FULL BINDING PROPERTY
177
JUNG YEON HWANG, SUNGWOOK EOM, KU- YOUNG CHANG, PIL JOONG LEE, AND
DAEHUN NYANG
A STUDY FOR CLASSIFICATION OF WEB BROWSER LOG AND TIMELINE VISUALIZATION
L92
JUNGHOON OH, NAMHEUN SON, SANGJIN LEE, AND KYUNGHO LEE
INTELLECTUAL PROPERTY PROTECTION FOR INTEGRATED SYSTEMS USING SOFT
PHYSICAL HASH FUNCTIONS 208
FRANGOIS DURVAUX, BENOIT GERARD, STEPHANIE KERCKHOF, FRANGOIS KOEUNE,
AND FRANGOIS-XAVIER STANDAERT
N-VICTIMS: AN APPROACH T O DETERMINE N-VICTIMS FOR A P T INVESTIGATIONS
226
SHUN-TE LIU, YI-MING CHEN, AND HUI-CHING HUNG
N E T W O R K S E C U R I T Y
AN EFFICIENT FILTERING METHOD FOR DETECTING MALICOUS WEB PAGES 241 JAEUN
CHOI, GISUNG KIM, TAE GHYOON KIM, AND SEHUN K I M
LIGHTWEIGHT CLIENT-SIDE METHODS FOR DETECTING EMAIL FORGERY 254
ERIC LIN, JOHN A Y COCK, AND MOHAMMAD MARMAN
AIGG THRESHOLD BASED H T T P G E T FLOODING ATTACK DETECTION 270
YANG-SEO CHOI, IK-KYUN KIM, JIN-TAE OH, AND JONG-SOO JANG
IMPLEMENTATION OF GESNIC FOR WEB SERVER PROTECTION AGAINST H T T P G E T
FLOODING ATTACKS 285
HYUNJOO KIM, BYOUNGKOO KIM, DAEWON KIM, IK-KYUN KIM, AND TAI-MYOUNG
CHUNG
PRIVACY-AWARE VANET SECURITY: PUTTING DATA-CENTRIC MISBEHAVIOR AND SYBIL
ATTACK DETECTION SCHEMES INTO PRACTICE 296
RASHEED HUSSAIN, SANGJIN KIM. AND HEEKUCK OH
ON TRIGGER DETECTION AGAINST REACTIVE JAMMING ATTACKS: A LOCALIZED
SOLUTION 312
INCHEOL SHIN, SINKYU KIM, AND JUNGTAEK SEO
IMAGE 3
TABLE OF CONTENTS XI
TRUST M A N A G E M E N T / D A T A B A S E S E C U R I T Y
EFFICIENT SELF-ORGANIZED TRUST MANAGEMENT IN LOCATION PRIVACY ENHANCED
VANETS 328
YU-CHIH WEI AND YI-MING CHEN
A TRUST MANAGEMENT MODEL FOR QOS-BASED SERVICE SELECTION 345
YUKYONG K I M AND KYUNG-GOO DOH
MULTILEVEL SECURE DATABASE ON SECURITY ENHANCED LINUX FOR SYSTEM HIGH
DISTRIBUTED SYSTEMS 358
HAKLIN KIMRN AND NORKEE SHERPA
A U T H O R I N D E X 371 |
any_adam_object | 1 |
author_GND | (DE-588)142029742 |
building | Verbundindex |
bvnumber | BV040604286 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 465f |
ctrlnum | (OCoLC)823231607 (DE-599)DNB102763401X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040604286</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130613</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121203s2012 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N46</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">102763401X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642354157</subfield><subfield code="9">3-642-35415-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642354151</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-35415-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642354151</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86192300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)823231607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB102763401X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security applications</subfield><subfield code="b">13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers</subfield><subfield code="c">Dong Hoon Lee ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 370 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7690</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Cheju</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Dong Hoon</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)142029742</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">WISA</subfield><subfield code="n">13</subfield><subfield code="d">2012</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1028511256</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-35416-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7690</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7690</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4175173&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431982&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025431982</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Cheju gnd-content |
genre_facet | Konferenzschrift 2012 Cheju |
id | DE-604.BV040604286 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:36Z |
institution | BVB |
institution_GND | (DE-588)1028511256 |
isbn | 3642354157 9783642354151 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025431982 |
oclc_num | 823231607 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM |
physical | XI, 370 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers Dong Hoon Lee ... (eds.) Berlin [u.a.] Springer 2012 XI, 370 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7690 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Cheju gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s DE-604 Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Computerforensik (DE-588)4774034-6 s Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Lee, Dong Hoon Sonstige (DE-588)142029742 oth WISA 13 2012 Jeju Sonstige (DE-588)1028511256 oth Erscheint auch als Online-Ausgabe 978-3-642-35416-8 Lecture notes in computer science 7690 (DE-604)BV000000607 7690 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4175173&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431982&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4330656-1 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4774034-6 (DE-588)4709127-7 (DE-588)1071861417 |
title | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers |
title_auth | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers |
title_exact_search | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers |
title_full | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers Dong Hoon Lee ... (eds.) |
title_fullStr | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers Dong Hoon Lee ... (eds.) |
title_full_unstemmed | Information security applications 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers Dong Hoon Lee ... (eds.) |
title_short | Information security applications |
title_sort | information security applications 13th international workshop wisa 2012 jeju island korea august 16 18 2012 revised selected papers |
title_sub | 13th international workshop, WISA 2012, Jeju Island, Korea, August 16 - 18, 2012 ; revised selected papers |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Datensicherung Rechnernetz Authentifikation Kryptosystem Kryptoanalyse Computersicherheit Computerforensik Sicherheitsprotokoll Konferenzschrift 2012 Cheju |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4175173&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431982&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT leedonghoon informationsecurityapplications13thinternationalworkshopwisa2012jejuislandkoreaaugust16182012revisedselectedpapers AT wisajeju informationsecurityapplications13thinternationalworkshopwisa2012jejuislandkoreaaugust16182012revisedselectedpapers |