Communications and multimedia security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8735 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 156 S. 235 mm x 155 mm |
ISBN: | 9783662448847 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV042079236 | ||
003 | DE-604 | ||
005 | 20140926 | ||
007 | t| | ||
008 | 140917s2014 gw |||| 10||| eng d | ||
015 | |a 14,N34 |2 dnb | ||
016 | 7 | |a 1055840303 |2 DE-101 | |
020 | |a 9783662448847 |c Pb. : ca. EUR 55.64 (DE) (freier Pr.), ca. EUR 57.20 (AT) (freier Pr.), ca. sfr 69.50 (freier Pr.) |9 978-3-662-44884-7 | ||
024 | 3 | |a 9783662448847 | |
028 | 5 | 2 | |a Best.-Nr.: 86381484 |
035 | |a (OCoLC)891856685 | ||
035 | |a (DE-599)DNB1055840303 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 670f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Communications and multimedia security |b 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings |c Bart De Decker ... (eds.) |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2014 | |
300 | |a XII, 156 S. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8735 | |
650 | 0 | 7 | |a Multimedia |0 (DE-588)4192358-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Aveiro |2 gnd-content | |
689 | 0 | 0 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |D s |
689 | 0 | 1 | |a Multimedia |0 (DE-588)4192358-3 |D s |
689 | 0 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 3 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 0 | 4 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 5 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 6 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |D s |
689 | 1 | 1 | |a Multimedia |0 (DE-588)4192358-3 |D s |
689 | 1 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 3 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 1 | 4 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 1 | 5 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a De Decker, Bart |d 1958- |0 (DE-588)141445580 |4 edt | |
711 | 2 | |a IFIP TC-6 and TC-11 Conference on Communications and Multimedia Security |n 15. |d 2014 |c Aveiro |j Sonstige |0 (DE-588)1058407961 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-662-44885-4 |
830 | 0 | |a Lecture notes in computer science |v 8735 |w (DE-604)BV000000607 |9 8735 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4756246&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027520348&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027520348 |
Datensatz im Suchindex
_version_ | 1820875612107046912 |
---|---|
adam_text |
TABLE OF CONTENTS
PART I: RESEARCH PAPERS
MALICIOUS MPLS POLICY ENGINE RECONNAISSANCE 3
ABDULRAHMAN AL-MUTAIRI AND STEPHEN WOLTFVUSEN
USB CONNECTION VULNERABILITIES ON ANDROID SMARTPHONES: DEFAULT
AND VENDORS' CUSTOMIZATIONS 19
ANDRE PEREIRA, MANUEL CORREIA, AND PEDRO BRANDAO
FREE TYPED TEXT USING KEYSTROKE DYNAMICS FOR CONTINUOUS
AUTHENTICATION 33
PAULO PINTO, BERNARDO PATRAO, AND HENRIQUE SANTOS
SECURE STORAGE ON ANDROID WITH CONTEXT-AWARE ACCESS CONTROL 46
FAYSAL BOUKAYOUA, JORN LAPON, BART DE DECKER,
AND VINCENT NAESSENS
PART II: WORK IN PROGRESS
A STUDY ON ADVANCED PERSISTENT THREATS 63
PING CHEN, LIEVEN DESMET, AND CHRISTOPHE HUYGENS
DYNAMIC PARAMETER RECONNAISSANCE FOR STEALTHY DOS ATTACK
WITHIN CLOUD SYSTEMS 73
SUAAD ALARIFI AND STEPHEN WOLTHUSEN
TOUCHPAD INPUT FOR CONTINUOUS BIOMETRIC AUTHENTICATION 86
ALEXANDER CHAN, TZIPORA HALEVI, AND NASIR MEMON
A FEDERATED CLOUD IDENTITY BROKER-MODEL FOR ENHANCED PRIVACY
VIA PROXY RE-ENCRYPTION 92
BERND ZWATTENDORFER, DANIEL SLAMANIG, KLAUS STRANACHER,
AND FELIX HORANDNER
D-SHUFFLE FOR PRET A VOTER 104
DALIA KHADER
NETWORKS
DMITRY CHERNYAVSKIY AND NATALIA MILOSLAVSKAYA
HTTP://D-NB.INFO/1055840303
XII TABLE OF CONTENTS
PART III: EXTENDED ABSTRACTS
INTRODUCTION TO ATTRIBUTE BASED SEARCHABLE ENCRYPTION 131
DALIA KHADER
RISK ANALYSIS OF PHYSICALLY UNCLONABLE FUNCTIONS 136
ANDREA KOLBERGER, INGRID SCHAUMIILLER-BICHL,
AND MARTIN DEUTSCHMANN
DECENTRALIZED BOOTSTRAP FOR SOCIAL OVERLAY NETWORKS 140
RODOLPHE MARQUES AND ANDRE ZUQUETE
PART IV: KEYNOTES
ENHANCING PRIVACY WITH QUANTUM NETWORKS 147
PAULO MATEUS, NIKOLA PAUNKOVIC, JOAO RODRIGUES, AND ANDR6 SOUTO
THE FUNDAMENTAL PRINCIPLE OF BREACH PREVENTION 154
RUI MELO BISCAIA
AUTHOR INDEX 157 |
any_adam_object | 1 |
author2 | De Decker, Bart 1958- |
author2_role | edt |
author2_variant | d b d db dbd |
author_GND | (DE-588)141445580 |
author_facet | De Decker, Bart 1958- |
building | Verbundindex |
bvnumber | BV042079236 |
classification_rvk | SS 4800 |
classification_tum | DAT 670f DAT 465f |
ctrlnum | (OCoLC)891856685 (DE-599)DNB1055840303 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008cb4500</leader><controlfield tag="001">BV042079236</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140926</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140917s2014 gw |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">14,N34</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1055840303</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662448847</subfield><subfield code="c">Pb. : ca. EUR 55.64 (DE) (freier Pr.), ca. EUR 57.20 (AT) (freier Pr.), ca. sfr 69.50 (freier Pr.)</subfield><subfield code="9">978-3-662-44884-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783662448847</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86381484</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)891856685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1055840303</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 670f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Communications and multimedia security</subfield><subfield code="b">15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings</subfield><subfield code="c">Bart De Decker ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 156 S.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8735</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Aveiro</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Multimedia</subfield><subfield code="0">(DE-588)4192358-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="5"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">De Decker, Bart</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)141445580</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IFIP TC-6 and TC-11 Conference on Communications and Multimedia Security</subfield><subfield code="n">15.</subfield><subfield code="d">2014</subfield><subfield code="c">Aveiro</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1058407961</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-662-44885-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8735</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8735</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4756246&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027520348&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027520348</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Aveiro gnd-content |
genre_facet | Konferenzschrift 2014 Aveiro |
id | DE-604.BV042079236 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:18:23Z |
institution | BVB |
institution_GND | (DE-588)1058407961 |
isbn | 9783662448847 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027520348 |
oclc_num | 891856685 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XII, 156 S. 235 mm x 155 mm |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings Bart De Decker ... (eds.) Heidelberg [u.a.] Springer 2014 XII, 156 S. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8735 Multimedia (DE-588)4192358-3 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Biometrie (DE-588)4124925-2 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Aveiro gnd-content Telekommunikationsnetz (DE-588)4133586-7 s Multimedia (DE-588)4192358-3 s Authentifikation (DE-588)4330656-1 s Biometrie (DE-588)4124925-2 s Privatsphäre (DE-588)4123980-5 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s DE-604 Elektronisches Wasserzeichen (DE-588)4572344-8 s Computerforensik (DE-588)4774034-6 s De Decker, Bart 1958- (DE-588)141445580 edt IFIP TC-6 and TC-11 Conference on Communications and Multimedia Security 15. 2014 Aveiro Sonstige (DE-588)1058407961 oth Erscheint auch als Online-Ausgabe 978-3-662-44885-4 Lecture notes in computer science 8735 (DE-604)BV000000607 8735 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4756246&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027520348&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings Lecture notes in computer science Multimedia (DE-588)4192358-3 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Biometrie (DE-588)4124925-2 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4192358-3 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4124925-2 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4572344-8 (DE-588)4133586-7 (DE-588)4774034-6 (DE-588)1071861417 |
title | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings |
title_auth | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings |
title_exact_search | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings |
title_full | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings Bart De Decker ... (eds.) |
title_fullStr | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings Bart De Decker ... (eds.) |
title_full_unstemmed | Communications and multimedia security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings Bart De Decker ... (eds.) |
title_short | Communications and multimedia security |
title_sort | communications and multimedia security 15th ifip tc 6 tc 11 international conference cms 2014 aveiro portugal september 25 26 2014 proceedings |
title_sub | 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 ; proceedings |
topic | Multimedia (DE-588)4192358-3 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Biometrie (DE-588)4124925-2 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd Computerforensik (DE-588)4774034-6 gnd |
topic_facet | Multimedia Kryptosystem Kryptoanalyse Biometrie Authentifikation Privatsphäre Elektronisches Wasserzeichen Telekommunikationsnetz Computerforensik Konferenzschrift 2014 Aveiro |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4756246&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027520348&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT dedeckerbart communicationsandmultimediasecurity15thifiptc6tc11internationalconferencecms2014aveiroportugalseptember25262014proceedings AT ifiptc6andtc11conferenceoncommunicationsandmultimediasecurityaveiro communicationsandmultimediasecurity15thifiptc6tc11internationalconferencecms2014aveiroportugalseptember25262014proceedings |