Information Security Applications: 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8909 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 406 p.) Ill. |
ISBN: | 9783319150871 9783319150864 |
DOI: | 10.1007/978-3-319-15087-1 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV042326112 | ||
003 | DE-604 | ||
005 | 20150715 | ||
007 | cr|uuu---uuuuu | ||
008 | 150204s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319150871 |c Online |9 978-3-319-15087-1 | ||
020 | |a 9783319150864 |c Print |9 978-3-319-15086-4 | ||
024 | 7 | |a 10.1007/978-3-319-15087-1 |2 doi | |
035 | |a (OCoLC)902889698 | ||
035 | |a (DE-599)BVBBV042326112 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-M347 |a DE-29 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information Security Applications |b 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers |c edited by Kyung-Hyune Rhee, Jeong Hyun Yi |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 406 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8909 | |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2014 |z Jeju Island |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 3 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 3 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 3 | |8 1\p |5 DE-604 | |
700 | 1 | |a Rhee, Kyung-Hyune |e Sonstige |0 (DE-588)1016030347 |4 oth | |
711 | 2 | |a WISA |n 15. |d 2014 |c Jeju |j Sonstige |0 (DE-588)1066501106 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8909 |w (DE-604)BV014880109 |9 8909 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-15087-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027762949 |
Datensatz im Suchindex
_version_ | 1820875648383582208 |
---|---|
adam_text |
INFORMATION SECURITY APPLICATIONS
/ RHEE, KYUNG-HYUNE
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
MALWARE DETECTION
MOBILE SECURITY
VULNERABILITY ANALYSIS
APPLIED CRYPTOGRAPHY
NETWORK SECURITY.-CRYPTOGRAPHY
HARDWARE SECURITY.-CRITICAL INFRASTRUCTURE SECURITY AND POLICY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION SECURITY APPLICATIONS
/ RHEE, KYUNG-HYUNE
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED PROCEEDINGS OF THE 15TH
INTERNATIONAL WORKSHOP ON INFORMATION SECURITY APPLICATIONS, WISA 2014,
HELD ON JEJU ISLAND, KOREA, IN AUGUST 2014. THE 30 REVISED FULL PAPERS
PRESENTED IN THIS VOLUME WERE CAREFULLY REVIEWED AND SELECTED FROM 69
SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS SUCH AS
MALWARE DETECTION; MOBILE SECURITY; VULNERABILITY ANALYSIS; APPLIED
CRYPTOGRAPHY; NETWORK SECURITY; CRYPTOGRAPHY; HARDWARE SECURITY; AND
CRITICAL INFRASTRUCTURE SECURITY AND POLICY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1016030347 |
building | Verbundindex |
bvnumber | BV042326112 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)902889698 (DE-599)BVBBV042326112 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-15087-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV042326112</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150715</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150204s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319150871</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-15087-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319150864</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-15086-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-15087-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)902889698</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042326112</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security Applications</subfield><subfield code="b">15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers</subfield><subfield code="c">edited by Kyung-Hyune Rhee, Jeong Hyun Yi</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 406 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8909</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2014</subfield><subfield code="z">Jeju Island</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rhee, Kyung-Hyune</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1016030347</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">WISA</subfield><subfield code="n">15.</subfield><subfield code="d">2014</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1066501106</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8909</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8909</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-15087-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027762949</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2014 Jeju Island gnd-content |
genre_facet | Konferenzschrift 2014 Jeju Island |
id | DE-604.BV042326112 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:18:58Z |
institution | BVB |
institution_GND | (DE-588)1066501106 |
isbn | 9783319150871 9783319150864 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027762949 |
oclc_num | 902889698 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-M347 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-M347 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 406 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers edited by Kyung-Hyune Rhee, Jeong Hyun Yi Cham Springer International Publishing 2015 1 Online-Ressource (XIII, 406 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8909 Informatik (DE-588)4026894-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2014 Jeju Island gnd-content Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s DE-604 Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Computerforensik (DE-588)4774034-6 s Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Chiffrierung (DE-588)4352893-4 s 1\p DE-604 Rhee, Kyung-Hyune Sonstige (DE-588)1016030347 oth WISA 15. 2014 Jeju Sonstige (DE-588)1066501106 oth Lecture Notes in Computer Science 8909 (DE-604)BV014880109 8909 https://doi.org/10.1007/978-3-319-15087-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers Lecture Notes in Computer Science Informatik (DE-588)4026894-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computerforensik (DE-588)4774034-6 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4026894-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)4011134-9 (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4070085-9 (DE-588)4774034-6 (DE-588)4352893-4 (DE-588)1071861417 |
title | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers |
title_auth | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers |
title_exact_search | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers |
title_full | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers edited by Kyung-Hyune Rhee, Jeong Hyun Yi |
title_fullStr | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers edited by Kyung-Hyune Rhee, Jeong Hyun Yi |
title_full_unstemmed | Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers edited by Kyung-Hyune Rhee, Jeong Hyun Yi |
title_short | Information Security Applications |
title_sort | information security applications 15th international workshop wisa 2014 jeju island korea august 25 27 2014 revised selected papers |
title_sub | 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers |
topic | Informatik (DE-588)4026894-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Rechnernetz (DE-588)4070085-9 gnd Computerforensik (DE-588)4774034-6 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Informatik Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Datenschutz Datensicherung Authentifikation Rechnernetz Computerforensik Chiffrierung Konferenzschrift 2014 Jeju Island |
url | https://doi.org/10.1007/978-3-319-15087-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027762949&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT rheekyunghyune informationsecurityapplications15thinternationalworkshopwisa2014jejuislandkoreaaugust25272014revisedselectedpapers AT wisajeju informationsecurityapplications15thinternationalworkshopwisa2014jejuislandkoreaaugust25272014revisedselectedpapers |