Advances in information and computer security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8639 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-92 DE-859 DE-861 DE-91 DE-384 DE-473 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XII, 285 S.) Ill., graph. Darst. |
ISBN: | 9783319098432 |
DOI: | 10.1007/978-3-319-09843-2 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV042165481 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 141104s2014 gw ad|| o|||| 10||| eng d | ||
020 | |a 9783319098432 |c Online |9 978-3-319-09843-2 | ||
024 | 7 | |a 10.1007/978-3-319-09843-2 |2 doi | |
035 | |a (OCoLC)890048597 | ||
035 | |a (DE-599)BVBBV042165481 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-859 |a DE-861 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 462f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in information and computer security |b 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings |c Maki Yoshida ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XII, 285 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8639 | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Hirosaki |2 gnd-content | |
689 | 0 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yoshida, Maki |e Sonstige |4 oth | |
711 | 2 | |a IWSEC |n 9. |d 2014 |c Hirosaki |j Sonstige |0 (DE-588)1056943513 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-09842-5 |
830 | 0 | |a Lecture notes in computer science |v 8639 |w (DE-604)BV014880109 |9 8639 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-09843-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027605019 | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-91 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-09843-2 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875628336906240 |
---|---|
adam_text |
ADVANCES IN INFORMATION AND COMPUTER SECURITY
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SYSTEM SECURITY
PRIVACY-FRIENDLY ACCESS CONTROL BASED ON PERSONAL ATTRIBUTES
ARE YOU THREATENING MY HAZARDS?
COMPLICATING PROCESS IDENTIFICATION BY REPLACING PROCESS INFORMATION FOR
ATTACK AVOIDANCE
KERNEL MEMORY PROTECTION BY AN INSERTABLE HYPERVISOR WHICH HAS VM
INTROSPECTION AND STEALTH BREAKPOINTS
KEY MANAGEMENT FOR ONION ROUTING IN A TRUE PEER TO PEER SETTING (SHORT
PAPER)
THRESHOLD CRYPTOGRAPHY
CHEATER IDENTIFIABLE SECRET SHARING SCHEMES VIA MULTI-RECEIVER
AUTHENTICATION
CHEATING DETECTABLE SECRET SHARING SCHEMES SUPPORTING AN ARBITRARY
FINITE FIELD (SHORT PAPER)
SECURE MULTI-PARTY COMPUTATION FOR ELLIPTIC CURVES (SHORT PAPER)
MORE CONSTRUCTIONS OF RE-SPLITTABLE THRESHOLD PUBLIC KEY ENCRYPTION
(SHORT PAPER)
HARDWARE SECURITY
HOW TO EFFECTIVELY DECREASE THE RESOURCE REQUIREMENT IN TEMPLATE ATTACK?
DETERMINISTIC HARD FAULT ATTACK ON TRIVIUM (SHORT PAPER)
DPA RESILIENCE OF ROTATION-SYMMETRIC S-BOXES
A TECHNIQUE USING PUFS FOR PROTECTING CIRCUIT LAYOUT DESIGNS AGAINST
REVERSE ENGINEERING
HYDRA: AN ENERGY-EFFICIENT PROGRAMMABLE CRYPTOGRAPHIC COPROCESSOR
SUPPORTING ELLIPTIC-CURVE PAIRINGS OVER FIELDS OF LARGE CHARACTERISTICS
FOUNDATION.-ON THE SECURITY PROOF OF AN AUTHENTICATION PROTOCOL FROM
EUROCRYPT 2011
IMPROVED LINEAR CRYPTANALYSIS OF REDUCED-ROUND MIBS
CHARACTERIZATION OF EME WITH LINEAR MIXING
EXPONENTIATION INVERSION PROBLEM REDUCED FROM FIXED ARGUMENT PAIRING
INVERSION ON TWISTABLE ATE PAIRING AND ITS DIFFICULTY (SHORT PAPER)
ENCRYPTION
RELATED KEY SECURE PKE FROM HASH PROOF SYSTEMS
TOWARDS SYMMETRIC FUNCTIONAL ENCRYPTION FOR REGULAR LANGUAGES WITH
PREDICATE PRIVACY (SHORT PAPER)
FRAMEWORK FOR EFFICIENT SEARCH AND STATISTICS COMPUTATION ON ENCRYPTED
CLOUD DATA (SHORT PAPER)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCES IN INFORMATION AND COMPUTER SECURITY
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 9TH INTERNATIONAL
WORKSHOP ON SECURITY, IWSEC 2014, HELD IN HIROSAKI, JAPAN, IN AUGUST
2014. THE 13 REGULAR PAPERS PRESENTED TOGETHER WITH 8 SHORT PAPERS IN
THIS VOLUME WERE CAREFULLY REVIEWED AND SELECTED FROM 55 SUBMISSIONS.
THE FOCUS OF THE WORKSHOP WAS ON THE FOLLOWING TOPICS: SYSTEM SECURITY,
THRESHOLD CRYPTOGRAPHY, HARDWARE SECURITY, FOUNDATION, AND ENCRYPTION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV042165481 |
classification_rvk | SS 4800 |
classification_tum | DAT 462f DAT 465f |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)890048597 (DE-599)BVBBV042165481 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-09843-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV042165481</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141104s2014 gw ad|| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319098432</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-09843-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-09843-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890048597</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042165481</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in information and computer security</subfield><subfield code="b">9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings</subfield><subfield code="c">Maki Yoshida ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 285 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8639</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Hirosaki</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yoshida, Maki</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IWSEC</subfield><subfield code="n">9.</subfield><subfield code="d">2014</subfield><subfield code="c">Hirosaki</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1056943513</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-09842-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8639</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8639</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027605019</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-09843-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Hirosaki gnd-content |
genre_facet | Konferenzschrift 2014 Hirosaki |
id | DE-604.BV042165481 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:18:38Z |
institution | BVB |
institution_GND | (DE-588)1056943513 |
isbn | 9783319098432 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027605019 |
oclc_num | 890048597 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
physical | 1 Online-Ressource (XII, 285 S.) Ill., graph. Darst. |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings Maki Yoshida ... (eds.) Cham [u.a.] Springer 2014 1 Online-Ressource (XII, 285 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8639 Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Hirosaki gnd-content Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Privatsphäre (DE-588)4123980-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Yoshida, Maki Sonstige oth IWSEC 9. 2014 Hirosaki Sonstige (DE-588)1056943513 oth Erscheint auch als Druckausgabe 978-3-319-09842-5 Lecture notes in computer science 8639 (DE-604)BV014880109 8639 https://doi.org/10.1007/978-3-319-09843-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings Lecture notes in computer science Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings |
title_auth | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings |
title_exact_search | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings |
title_full | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings Maki Yoshida ... (eds.) |
title_fullStr | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings Maki Yoshida ... (eds.) |
title_full_unstemmed | Advances in information and computer security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings Maki Yoshida ... (eds.) |
title_short | Advances in information and computer security |
title_sort | advances in information and computer security 9th international workshop on security iwsec 2014 hirosaki japan august 27 29 2014 proceedings |
title_sub | 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27 - 29, 2014 ; proceedings |
topic | Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Privatsphäre Kryptoanalyse Kryptosystem Computersicherheit Sicherheitsprotokoll Konferenzschrift 2014 Hirosaki |
url | https://doi.org/10.1007/978-3-319-09843-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027605019&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT yoshidamaki advancesininformationandcomputersecurity9thinternationalworkshoponsecurityiwsec2014hirosakijapanaugust27292014proceedings AT iwsechirosaki advancesininformationandcomputersecurity9thinternationalworkshoponsecurityiwsec2014hirosakijapanaugust27292014proceedings |