Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York, NY
Springer
2010
|
Schriftenreihe: | Communications in computer and information science
122 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-473 DE-703 DE-20 DE-706 DE-739 Volltext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV036963202 | ||
003 | DE-604 | ||
005 | 20150210 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 110118s2010 gw |||| o||u| ||||||eng d | ||
016 | 7 | |a 1008091456 |2 DE-101 | |
020 | |a 9783642176104 |c Online |9 978-3-642-17610-4 | ||
024 | 7 | |a 10.1007/978-3-642-17610-4 |2 doi | |
035 | |a (OCoLC)873719690 | ||
035 | |a (DE-599)DNB1008091456 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-M347 |a DE-473 |a DE-20 |a DE-703 |a DE-739 |a DE-706 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Security technology, disaster recovery and business continuity |b international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings |c Tai-hoon Kim ... (eds.) |
264 | 1 | |a Berlin ; Heidelberg ; New York, NY |b Springer |c 2010 | |
300 | |a 1 Online-Ressource (XIII, 300 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Communications in computer and information science |v 122 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Cheju |2 gnd-content | |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 1 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | 1 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 2 | 2 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |D s |
689 | 3 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Kim, T'ae-hun |0 (DE-588)139711155 |4 edt | |
711 | 2 | |a SecTech |d 2010 |c Jeju |j Sonstige |0 (DE-588)16092146-6 |4 oth | |
711 | 2 | |a Future Generation Information Technology Conference |n 2 |d 2010 |c Jeju |j Sonstige |0 (DE-588)16171493-6 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-642-17609-8 |
830 | 0 | |a Communications in computer and information science |v 122 |w (DE-604)BV041227480 |9 122 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-17610-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020878066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-706 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-642-17610-4 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-UBG_katkey | 2752246 |
---|---|
_version_ | 1811359615558877184 |
adam_text |
IMAGE 1
TABLE OF CONTENTS
IMPACT OF FINGER TYPE IN FINGERPRINT AUTHENTICATION 1
DAVRONDZHON GAFUROV, PATRICK BOURS, BIAN YANG, AND CHRISTOPH BUSCH
USING ARABIC CAPTCHA FOR CYBER SECURITY 8
BILAL KHAN, KHALED S. ALGHATHBAR, MUHAMMAD KHURRAM KHAN, ABDULLAH M.
ALKELABI, AND ABDULAZIZ ALAJAJI
INFORMATION ASSURANCE IN SAUDI ORGANIZATIONS - AN EMPIRICAL STUDY . .
18 SYED IRFAN NABI, ABDULRAHMAN A. MIRZA, AND KHALED ALGHATHBAR
EMERGING BIOMETRIE MODALITIES: CHALLENGES AND OPPORTUNITIES 29
DAVRONDZHON GAFUROV
ON DISTINGUISHED POINTS METHOD TO IMPLEMENT A PARALLEL COLLISION SEARCH
ATTACK ON ECDLP 39
JU-SUNG KANG AND OK- YEON YI
DATA CONFIDENTIALITY AND INTEGRITY ISSUES AND ROLE OF INFORMATION
SECURITY MANAGEMENT STANDARD, POLICIES AND PRACTICES - AN EMPIRICAL
STUDY OF TELECOMMUNICATION INDUSTRY IN PAKISTAN 47
SYED IRFAN NABI, SYED WAQAR NABI, SYED AWAIS AHMED TIPU, BUSHRA HAQQI,
ZAHRA ABID, AND KHALED ALGHATHBAR
EVALUATION OF PERFORMANCE OF SECURE OS USING PERFORMANCE EVALUATION
MECHANISM OF LSM-BASED LSMPMON 57
KENJI YAMAMOTO AND TOSHIHIRO YAMAUCHI
SAMPLE BYTES TO PROTECT IMPORTANT DATA FROM UNINTENTIONAL TRANSMISSION
IN ADVANCED EMBEDDED DEVICE 68
BO-HEUNG CHUNG AND JUNG-NYE KIM
SECURE OSGI PLATFORM AGAINST SERVICE INJECTION 74
INTAE KIM, KEEWOOK RIM, AND JUNGHYUN LEE
A MECHANISM THAT BOUNDS EXECUTION PERFORMANCE FOR PROCESS GROUP FOR
MITIGATING CPU ABUSE 84
TOSHIHIRO YAMAUCHI, TAKAYUKI KARA, AND HIDEO TANIGUCHI
PROBABILISTIC ROUTE SELECTION ALGORITHM FOR IP TRACEBACK 94 HONG-BIN YIM
AND JAE-IL JUNG
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008091456
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
AN EFFICIENT AUDIO WATERMARKING ALGORITHM IN FREQUENCY DOMAIN FOR
COPYRIGHT PROTECTION 104
PRANAB KUMAR DHAR, MOHAMMAD IBRAHIM KHAN, CHEOL-HONG KIM, AND JONG-MYON
KIM
ROBUST AUDIO WATERMARKING SCHEME BASED ON DETERMINISTIC PLUS STOCHASTIC
MODEL 114
PRANAB KUMAR DHAR, CHEOL HONG KIM, AND JONG-MYON KIM
HISTOGRAM-BASED REVERSIBLE DATA HIDING WITH QUADTREE CONCEPTS 126
HSIANG-CHEH HUANG, TING-HSUAN WANG, AND WAI-CHI FANG
MAS: MAI WARE ANALYSIS SYSTEM BASED ON HARD WARE-ASSISTED VIRTUALIZATION
TECHNOLOGY 134
TAEHYOUNG KIM, INHYUK KIM, CHANGWOO MIN, AND YOUNG IK EOM
PERFORMANCE ANALYSIS OF CYBER SECURITY AWARENESS DELIVERY M E T H O D S
. . 142 JEMAL ABAWAJY AND TAI-HOON KIM
PROXY RE-ENCRYPTION WITH KEYWORD SEARCH: NEW DEFINITIONS AND ALGORITHMS
149
WEI-CHUEN YAU, RAPHAEL C.-W. PHAN, SWEE-HUAY HENG, AND BOK-MIN GOI
ONE-TIME PASSWORD SYSTEM WITH INFINITE NESTED HASH CHAINS 161 MOHAMED
HAMDY ELDEFRAWY, MUHAMMAD KHURRAM KHAN, AND KHALED ALGHATHBAR
OPTIMAL INTELLIGENT SUPERVISORY CONTROL SYSTEM IN CYBER-PHYSICAL
INTELLIGENCE 171
HOON KO AND ZITA VALE
IMPROVED HIP-BASED INDIVIDUAL RECOGNITION USING WEARABLE MOTION
RECORDING SENSOR 179
DAVRONDZHON GAFUROV AND PATRICK BOURS
FUSION OF MOVING AND STATIC FACIAL FEATURES FOR ROBUST FACE RECOGNITION
187
DAKSHINA RANJAN KISKU, PHALGUNI GUPTA, AND JAMUNA KANTA SING
HUMAN AUTHENTICATION BASED ON ECG WAVES USING RADON TRANSFORM 197
CHETANA HEGDE, H. RAHUL PRABHU, D.S. SAGAR, P. DEEPA SHENOY, K.R.
VENUGOPAL, AND L.M. PATNAIK
WIRELESS NETWORK SECURITY VULNERABILITIES AND CONCERNS 207
AHMAD MUSHTAQ
FIGMENT AUTHENTICATION SCHEME IN WIRELESS SENSOR NETWORK 220 N. AMBIKA
AND G.T. RAJU
IMAGE 3
TABLE OF CONTENTS XIII
ISSUES OF SECURITY AND NETWORK LOAD IN PRESENCE - A SURVEY 224
ZEESHAN SHAFI KHAN, KHALED ALGHATHBAR, MUHAMMAD SHER, AND KHALID RASHID
DISCOVERING THE BOTNET DETECTION TECHNIQUES 231
ANEEL RAHIM AND FAHAD T. BIN MUHAYA
CONTACTLESS BIOMETRICS IN WIRELESS SENSOR NETWORK: A SURVEY 236 MUHAMMAD
IMRAN RAZZAK, MUHAMMAD KHURRAM KHAN, AND KHALED ALGHATHBAR
A GENERIC APPROACH TO SECURITY ASSURED NET-CENTRIC COMMUNICATIONS
NETWORK ARCHITECTURE FOR C4I SYSTEMS 244
ABDULLAH S. ALGHAMDI, SYED AMANULLAH QUADRI, IFTIKHAR AHMAD, AND KHALID
AL-NAFJAN
COLLABORATIVE GEOSPATIAL DATA AS APPLIED TO DISASTER RELIEF: HAITI 2010
250
A.J. CLARK, PATTON HOLLIDAY, ROBYN CHAU, HARRIS EISENBERG, AND MELINDA
CHAU
EFFECTS OF CHANGES IN LUGU LAKE WATER QUALITY ON SCHIZOTHORAX YUNNANSIS
ECOLOGICAL HABITAT BASED ON HABITAT MODEL 259
WEI HUANG AND ARTHUR MYNNET
INTERNET SCADA UTILIZING API'S AS DATA SOURCE 269
ROSSLIN JOHN ROBLES, HAENG-KON KIM, AND TAI-HOON KIM
INSECURE INFORMATION SYSTEM'S SOLUTION USING ISOLATION METHOD 276
MARICEL BALITANAS AND TAI-HOON KIM
COMMUNICATION SECURITY FOR CONTROL SYSTEMS IN SMART GRID 282 ROSSLIN
JOHN ROBLES AND TAI-HOON KIM
NMACA APPROACH USED TO BUILD A SECURE MESSAGE AUTHENTICATION CODE 290
RAED ALOSAIMY, KHALED ALGHATHBAR, ALAAELDIN M. HAFEZ, AND MOHAMED H.
ELDEFRAWY
AUTHOR INDEX 299 |
any_adam_object | 1 |
author2 | Kim, T'ae-hun |
author2_role | edt |
author2_variant | t h k thk |
author_GND | (DE-588)139711155 |
author_facet | Kim, T'ae-hun |
building | Verbundindex |
bvnumber | BV036963202 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)873719690 (DE-599)DNB1008091456 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-17610-4 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 cb4500</leader><controlfield tag="001">BV036963202</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150210</controlfield><controlfield tag="006">a |||| 10|||</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">110118s2010 gw |||| o||u| ||||||eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008091456</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642176104</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-17610-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-17610-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)873719690</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008091456</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security technology, disaster recovery and business continuity</subfield><subfield code="b">international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings</subfield><subfield code="c">Tai-hoon Kim ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 300 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Communications in computer and information science</subfield><subfield code="v">122</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Cheju</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, T'ae-hun</subfield><subfield code="0">(DE-588)139711155</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SecTech</subfield><subfield code="d">2010</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16092146-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Future Generation Information Technology Conference</subfield><subfield code="n">2</subfield><subfield code="d">2010</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16171493-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-642-17609-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Communications in computer and information science</subfield><subfield code="v">122</subfield><subfield code="w">(DE-604)BV041227480</subfield><subfield code="9">122</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020878066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-17610-4</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Cheju gnd-content |
genre_facet | Konferenzschrift 2010 Cheju |
id | DE-604.BV036963202 |
illustrated | Illustrated |
index_date | 2024-09-19T15:27:00Z |
indexdate | 2024-09-27T16:20:28Z |
institution | BVB |
institution_GND | (DE-588)16092146-6 (DE-588)16171493-6 |
isbn | 9783642176104 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020878066 |
oclc_num | 873719690 |
open_access_boolean | |
owner | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 |
owner_facet | DE-M347 DE-473 DE-BY-UBG DE-20 DE-703 DE-739 DE-706 DE-634 |
physical | 1 Online-Ressource (XIII, 300 S.) Ill., graph. Darst. |
psigel | ZDB-2-SCS |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Communications in computer and information science |
series2 | Communications in computer and information science |
spellingShingle | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Communications in computer and information science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Biometrie (DE-588)4124925-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4330656-1 (DE-588)7636249-8 (DE-588)4572344-8 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4687059-3 (DE-588)4124925-2 (DE-588)1071861417 |
title | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings |
title_auth | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings |
title_exact_search | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings |
title_full | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Tai-hoon Kim ... (eds.) |
title_fullStr | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Tai-hoon Kim ... (eds.) |
title_full_unstemmed | Security technology, disaster recovery and business continuity international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings Tai-hoon Kim ... (eds.) |
title_short | Security technology, disaster recovery and business continuity |
title_sort | security technology disaster recovery and business continuity international conferences sectech and drbc 2010 held as part of the future generation information technology conference fgit 2010 jeju island korea december 13 15 2010 proceedings |
title_sub | international conferences ; SecTech and DRBC 2010, held as part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13 - 15, 2010 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Kritische Infrastruktur (DE-588)7636249-8 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Biometrie (DE-588)4124925-2 gnd |
topic_facet | Datensicherung Rechnernetz Authentifikation Kritische Infrastruktur Elektronisches Wasserzeichen Kryptoanalyse Computersicherheit Malware Biometrie Konferenzschrift 2010 Cheju |
url | https://doi.org/10.1007/978-3-642-17610-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020878066&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV041227480 |
work_keys_str_mv | AT kimtaehun securitytechnologydisasterrecoveryandbusinesscontinuityinternationalconferencessectechanddrbc2010heldaspartofthefuturegenerationinformationtechnologyconferencefgit2010jejuislandkoreadecember13152010proceedings AT sectechjeju securitytechnologydisasterrecoveryandbusinesscontinuityinternationalconferencessectechanddrbc2010heldaspartofthefuturegenerationinformationtechnologyconferencefgit2010jejuislandkoreadecember13152010proceedings AT futuregenerationinformationtechnologyconferencejeju securitytechnologydisasterrecoveryandbusinesscontinuityinternationalconferencessectechanddrbc2010heldaspartofthefuturegenerationinformationtechnologyconferencefgit2010jejuislandkoreadecember13152010proceedings |