Information and communications security: 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8233 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 414 S.) graph. Darst. |
ISBN: | 9783319027258 9783319027265 |
DOI: | 10.1007/978-3-319-02726-5 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV041582955 | ||
003 | DE-604 | ||
005 | 20140226 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 140122s2013 |||| o||u| ||||||eng d | ||
020 | |a 9783319027258 |9 978-3-319-02725-8 | ||
020 | |a 9783319027265 |c eISBN |9 978-3-319-02726-5 | ||
024 | 7 | |a 10.1007/978-3-319-02726-5 |2 doi | |
035 | |a (OCoLC)862045842 | ||
035 | |a (DE-599)BVBBV041582955 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.82 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information and communications security |b 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings |c Sihan Qing ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIII, 414 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8233 | |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 4 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Qing, Sihan |e Sonstige |4 oth | |
711 | 2 | |a ICICS |n 15. |d 2013 |c Peking |j Sonstige |0 (DE-588)1043831347 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 8233 |w (DE-604)BV014880109 |9 8233 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-02726-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027028180 |
Datensatz im Suchindex
_version_ | 1804151772571238400 |
---|---|
adam_text | INFORMATION AND COMMUNICATIONS SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SYSTEM SECURITY
WEB SECURITY AND WORM DETECTION
CLOUD STORAGE SECURITY
VIRTUALIZATION FOR CLOUD COMPUTING
TRUSTED AND TRUSTWORTHY COMPUTING
AUTHENTICATION AND SECURITY PROTOCOLS
INTRUSION DETECTION AND RECOVERY
SIDE CHANNEL ATTACKS AND DEFENSE
ENGINEERING ISSUES OF CRYPTO
CRYPTANALYSIS
ATTRIBUTE-BASED ENCRYPTION
CRYPTOGRAPHIC PRIMITIVES AND APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION AND COMMUNICATIONS SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 15TH INTERNATIONAL
CONFERENCE ON INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2013, HELD
IN BEIJING, CHINA, IN NOVEMBER 2013. THE 23 REGULAR PAPERS AND 6 SHORT
PAPERS WERE CAREFULLY REVIEWED AND SELECTED FROM 113 SUBMISSIONS. THE
PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON SYSTEM SECURITY, WEB
SECURITY AND WORM DETECTION, CLOUD STORAGE SECURITY, VIRTUALIZATION FOR
CLOUD COMPUTING, TRUSTED AND TRUSTWORTHY COMPUTING, AUTHENTICATION AND
SECURITY PROTOCOLS, INTRUSION DETECTION AND RECOVERY, SIDE CHANNEL
ATTACKS AND DEFENSE, ENGINEERING ISSUES OF CRYPTO, CRYPTANALYSIS,
ATTRIBUTE-BASED ENCRYPTION, AND CRYPTOGRAPHIC PRIMITIVES AND
APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041582955 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)862045842 (DE-599)BVBBV041582955 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-02726-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03030nmm a2200637 cb4500</leader><controlfield tag="001">BV041582955</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140226 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140122s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319027258</subfield><subfield code="9">978-3-319-02725-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319027265</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-319-02726-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-02726-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862045842</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041582955</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings</subfield><subfield code="c">Sihan Qing ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 414 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8233</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qing, Sihan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">15.</subfield><subfield code="d">2013</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1043831347</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8233</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8233</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-02726-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027028180</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Peking gnd-content |
genre_facet | Konferenzschrift 2013 Peking |
id | DE-604.BV041582955 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:00:08Z |
institution | BVB |
institution_GND | (DE-588)1043831347 |
isbn | 9783319027258 9783319027265 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027028180 |
oclc_num | 862045842 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 414 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings Sihan Qing ... (eds.) Cham [u.a.] Springer 2013 1 Online-Ressource (XIII, 414 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8233 Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Peking gnd-content Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s Kryptologie (DE-588)4033329-2 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Qing, Sihan Sonstige oth ICICS 15. 2013 Peking Sonstige (DE-588)1043831347 oth Lecture notes in computer science 8233 (DE-604)BV014880109 8233 https://doi.org/10.1007/978-3-319-02726-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings Lecture notes in computer science Sicherheitsprotokoll (DE-588)4709127-7 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4709127-7 (DE-588)4070085-9 (DE-588)4011144-1 (DE-588)4830502-9 (DE-588)4033329-2 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings |
title_auth | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings |
title_exact_search | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings |
title_full | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings Sihan Qing ... (eds.) |
title_fullStr | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings Sihan Qing ... (eds.) |
title_full_unstemmed | Information and communications security 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings Sihan Qing ... (eds.) |
title_short | Information and communications security |
title_sort | information and communications security 15th international conference icics 2013 beijing china november 20 22 2013 proceedings |
title_sub | 15th international conference, ICICS 2013, Beijing, China, November 20 - 22, 2013 ; proceedings |
topic | Sicherheitsprotokoll (DE-588)4709127-7 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Sicherheitsprotokoll Rechnernetz Datensicherung Kryptoanalyse Kryptologie Kryptosystem Computersicherheit Konferenzschrift 2013 Peking |
url | https://doi.org/10.1007/978-3-319-02726-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028180&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT qingsihan informationandcommunicationssecurity15thinternationalconferenceicics2013beijingchinanovember20222013proceedings AT icicspeking informationandcommunicationssecurity15thinternationalconferenceicics2013beijingchinanovember20222013proceedings |