Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2015
|
Ausgabe: | 1st ed. 2015 |
Schriftenreihe: | Lecture Notes in Computer Science
9241 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XIII, 357 p. 51 illus) |
ISBN: | 9783319224251 9783319224244 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-22425-1 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042788339 | ||
003 | DE-604 | ||
005 | 20150902 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150901s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319224251 |c Online |9 978-3-319-22425-1 | ||
020 | |a 9783319224244 |c Print |9 978-3-319-22424-4 | ||
024 | 7 | |a 10.1007/978-3-319-22425-1 |2 doi | |
035 | |a (OCoLC)920801152 | ||
035 | |a (DE-599)BVBBV042788339 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 462f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in Information and Computer Security |b 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings |c edited by Keisuke Tanaka, Yuji Suga |
250 | |a 1st ed. 2015 | ||
264 | 1 | |a Cham |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 357 p. 51 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9241 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer software | |
650 | 4 | |a Computational complexity | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Discrete Mathematics in Computer Science | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Nara |2 gnd-content | |
689 | 0 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Tanaka, Keisuke |e Sonstige |4 oth | |
711 | 2 | |a IWSEC |n 10. |d 2015 |c Nara |j Sonstige |0 (DE-588)1076088120 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9241 |w (DE-604)BV014880109 |9 9241 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-22425-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028218216 |
Datensatz im Suchindex
_version_ | 1804175020968116224 |
---|---|
adam_text | ADVANCES IN INFORMATION AND COMPUTER SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE 10TH INTERNATIONAL WORKSHOP
ON SECURITY, IWSEC 2015, HELD IN NARA, JAPAN, IN AUGUST 2015. THE 18
FULL PAPERS AND 3 SHORT PAPERS PRESENTED IN THIS VOLUME WERE CAREFULLY
REVIEWED AND SELECTED FROM 58 SUBMISSIONS. THEY WERE ORGANIZED IN
TOPICAL SECTIONS NAMED: IDENTITY-BASED ENCRYPTION; ELLIPTIC CURVE
CRYPTOGRAPHY; FACTORING; SYMMETRIC CRYPTANALYSIS; PROVABLE SECURITY;
LWE-BASED ENCRYPTION; PRIVACY-PRESERVING AND ANONYMITY; SECURE PROTOCOL;
SYSTEMS SECURITY; AND SECURITY IN HARDWARE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV042788339 |
classification_tum | DAT 462f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)920801152 (DE-599)BVBBV042788339 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-22425-1 |
edition | 1st ed. 2015 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03119nmm a2200733zcb4500</leader><controlfield tag="001">BV042788339</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150902 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150901s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319224251</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-22425-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319224244</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-22424-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-22425-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)920801152</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042788339</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in Information and Computer Security</subfield><subfield code="b">10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings</subfield><subfield code="c">edited by Keisuke Tanaka, Yuji Suga</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 357 p. 51 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9241</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Discrete Mathematics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Nara</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tanaka, Keisuke</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">IWSEC</subfield><subfield code="n">10.</subfield><subfield code="d">2015</subfield><subfield code="c">Nara</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1076088120</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9241</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9241</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-22425-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028218216</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Nara gnd-content |
genre_facet | Konferenzschrift 2015 Nara |
id | DE-604.BV042788339 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:09:39Z |
institution | BVB |
institution_GND | (DE-588)1076088120 |
isbn | 9783319224251 9783319224244 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028218216 |
oclc_num | 920801152 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 357 p. 51 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings edited by Keisuke Tanaka, Yuji Suga 1st ed. 2015 Cham Springer 2015 1 Online-Ressource (XIII, 357 p. 51 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9241 0302-9743 Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Discrete Mathematics in Computer Science Algorithm Analysis and Problem Complexity Informatik Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Nara gnd-content Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Privatsphäre (DE-588)4123980-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Tanaka, Keisuke Sonstige oth IWSEC 10. 2015 Nara Sonstige (DE-588)1076088120 oth Lecture Notes in Computer Science 9241 (DE-604)BV014880109 9241 https://doi.org/10.1007/978-3-319-22425-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings Lecture Notes in Computer Science Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Discrete Mathematics in Computer Science Algorithm Analysis and Problem Complexity Informatik Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Computersicherheit (DE-588)4274324-2 gnd Privatsphäre (DE-588)4123980-5 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4709127-7 (DE-588)4274324-2 (DE-588)4123980-5 (DE-588)1071861417 |
title | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings |
title_auth | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings |
title_exact_search | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings |
title_full | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings edited by Keisuke Tanaka, Yuji Suga |
title_fullStr | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings edited by Keisuke Tanaka, Yuji Suga |
title_full_unstemmed | Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings edited by Keisuke Tanaka, Yuji Suga |
title_short | Advances in Information and Computer Security |
title_sort | advances in information and computer security 10th international workshop on security iwsec 2015 nara japan august 26 28 2015 proceedings |
title_sub | 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings |
topic | Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Discrete Mathematics in Computer Science Algorithm Analysis and Problem Complexity Informatik Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Computersicherheit (DE-588)4274324-2 gnd Privatsphäre (DE-588)4123980-5 gnd |
topic_facet | Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer software Computational complexity Computer Science Systems and Data Security Data Encryption Discrete Mathematics in Computer Science Algorithm Analysis and Problem Complexity Informatik Kryptosystem Kryptoanalyse Sicherheitsprotokoll Computersicherheit Privatsphäre Konferenzschrift 2015 Nara |
url | https://doi.org/10.1007/978-3-319-22425-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028218216&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT tanakakeisuke advancesininformationandcomputersecurity10thinternationalworkshoponsecurityiwsec2015narajapanaugust26282015proceedings AT iwsecnara advancesininformationandcomputersecurity10thinternationalworkshoponsecurityiwsec2015narajapanaugust26282015proceedings |