Information security practice and experience: 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7863 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 388 S.) graph. Darst. |
ISBN: | 9783642380327 9783642380334 |
DOI: | 10.1007/978-3-642-38033-4 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041394242 | ||
003 | DE-604 | ||
005 | 20140305 | ||
007 | cr|uuu---uuuuu | ||
008 | 131104s2013 xx d||| o|||| 10||| eng d | ||
020 | |a 9783642380327 |9 978-3-642-38032-7 | ||
020 | |a 9783642380334 |c eISBN |9 978-3-642-38033-4 | ||
024 | 7 | |a 10.1007/978-3-642-38033-4 |2 doi | |
035 | |a (OCoLC)852531630 | ||
035 | |a (DE-599)BVBBV041394242 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-739 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Information security practice and experience |b 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings |c Robert H. Deng ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIII, 388 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7863 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Lanzhou |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 2 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Deng, Robert |e Sonstige |4 oth | |
711 | 2 | |a ISPEC |n 9 |d 2013 |c Lanzhou |j Sonstige |0 (DE-588)1034116169 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7863 |w (DE-604)BV014880109 |9 7863 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-38033-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026841951 |
Datensatz im Suchindex
_version_ | 1820875505603182592 |
---|---|
adam_text |
INFORMATION SECURITY PRACTICE AND EXPERIENCE
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
ENHANCING FALSE ALARM REDUCTION USING POOL-BASED ACTIVE LEARNING IN
NETWORK INTRUSION DETECTION
TRUSTED IDENTITY MANAGEMENT FOR OVERLAY NETWORKS
SITUATIONAL AWARENESS FOR IMPROVING NETWORK RESILIENCE MANAGEMENT
OPTIMAL DEFENSE STRATEGIES FOR DDOS DEFENDER USING BAYESIAN GAME MODEL
IDENTITY-BASED CRYPTOGRAPHY
ATTRIBUTE SPECIFIED IDENTITY-BASED ENCRYPTION
LEAKAGE-RESILIENT ATTRIBUTE-BASED ENCRYPTION WITH FAST DECRYPTION:
MODELS, ANALYSIS AND CONSTRUCTIONS
IDENTITY-BASED MULTISIGNATURE WITH MESSAGE RECOVERY
IMPROVING THE MESSAGE-CIPHERTEXT RATE OF LEWKO'S FULLY SECURE IBE SCHEME
CRYPTOGRAPHIC PRIMITIVES ACCOUNTABLE TRAPDOOR SANITIZABLE SIGNATURES
A CONDITIONAL PROXY BROADCAST RE-ENCRYPTION SCHEME SUPPORTING
TIMED-RELEASE
ABOUT HASH INTO MONTGOMERY FORM ELLIPTIC CURVES
SECURE RFID OWNERSHIP TRANSFER PROTOCOLS
LEAKAGE RESILIENT AUTHENTICATED KEY EXCHANGE SECURE IN THE AUXILIARY
INPUT MODEL
EXPRESSING USER ACCESS AUTHORIZATION EXCEPTIONS IN CONVENTIONAL
ROLE-BASED ACCESS CONTROL
CRYPTANALYSIS OF THE OKH AUTHENTICATED ENCRYPTION SCHEME
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION SECURITY PRACTICE AND EXPERIENCE
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 9TH INTERNATIONAL
CONFERENCE ON INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2013,
HELD IN LANZHOU, CHINA, IN MAY 2013. THE 27 REVISED FULL PAPERS
PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM 71 SUBMISSIONS. THE
PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON NETWORK SECURITY;
IDENTITY-BASED CRYPTOGRAPHY; CRYPTOGRAPHIC PRIMITIVES; SECURITY
PROTOCOLS; SYSTEM SECURITY; SOFTWARE SECURITY AND DRM; AND CRYPTANALYSIS
AND SIDE CHANNEL ATTACKS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041394242 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)852531630 (DE-599)BVBBV041394242 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-38033-4 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041394242</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140305</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131104s2013 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642380327</subfield><subfield code="9">978-3-642-38032-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642380334</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-38033-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-38033-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852531630</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041394242</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security practice and experience</subfield><subfield code="b">9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings</subfield><subfield code="c">Robert H. Deng ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 388 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7863</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Lanzhou</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Deng, Robert</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISPEC</subfield><subfield code="n">9</subfield><subfield code="d">2013</subfield><subfield code="c">Lanzhou</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1034116169</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7863</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7863</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-38033-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026841951</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Lanzhou gnd-content |
genre_facet | Konferenzschrift 2013 Lanzhou |
id | DE-604.BV041394242 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:41Z |
institution | BVB |
institution_GND | (DE-588)1034116169 |
isbn | 9783642380327 9783642380334 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026841951 |
oclc_num | 852531630 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-739 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-739 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 388 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings Robert H. Deng ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XIII, 388 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7863 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Lanzhou gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Schlüsselverwaltung (DE-588)4625230-7 s DE-604 Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Deng, Robert Sonstige oth ISPEC 9 2013 Lanzhou Sonstige (DE-588)1034116169 oth Lecture notes in computer science 7863 (DE-604)BV014880109 7863 https://doi.org/10.1007/978-3-642-38033-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4625230-7 (DE-588)1071861417 |
title | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings |
title_auth | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings |
title_exact_search | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings |
title_full | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings Robert H. Deng ... (eds.) |
title_fullStr | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings Robert H. Deng ... (eds.) |
title_full_unstemmed | Information security practice and experience 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings Robert H. Deng ... (eds.) |
title_short | Information security practice and experience |
title_sort | information security practice and experience 9th international conference ispec 2013 lanzhou china may 12 14 2013 proceedings |
title_sub | 9th international conference, ISPEC 2013, Lanzhou, China, May 12 - 14, 2013 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd |
topic_facet | Datensicherung Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Schlüsselverwaltung Konferenzschrift 2013 Lanzhou |
url | https://doi.org/10.1007/978-3-642-38033-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841951&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT dengrobert informationsecuritypracticeandexperience9thinternationalconferenceispec2013lanzhouchinamay12142013proceedings AT ispeclanzhou informationsecuritypracticeandexperience9thinternationalconferenceispec2013lanzhouchinamay12142013proceedings |