Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Soriano, Miguel (VerfasserIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2010
Schriftenreihe:Lecture Notes in Computer Science 6476
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV037187230
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 110126s2010 gw d||| o|||| 10||| eng d
020 |a 9783642176500  |c Online  |9 978-3-642-17650-0 
024 7 |a 10.1007/978-3-642-17650-0  |2 doi 
035 |a (OCoLC)1074265165 
035 |a (DE-599)BVBBV037187230 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-473  |a DE-19  |a DE-91  |a DE-706  |a DE-739  |a DE-384  |a DE-M347  |a DE-20  |a DE-703  |a DE-634 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 465f  |2 stub 
084 |a DAT 461f  |2 stub 
084 |a 004  |2 sdnb 
084 |a DAT 000  |2 stub 
100 1 |a Soriano, Miguel  |e Verfasser  |4 aut 
245 1 0 |a Information and communications security  |b 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings  |c Miguel Soriano ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2010 
300 |a 1 Online-Ressource (XIV, 474 S.)  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6476 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Anonymität  |0 (DE-588)4471050-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Trusted Computing  |0 (DE-588)7562931-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2010  |z Barcelona  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 2 |5 DE-604 
689 3 0 |a Anonymität  |0 (DE-588)4471050-1  |D s 
689 3 1 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 3 2 |a Trusted Computing  |0 (DE-588)7562931-8  |D s 
689 3 |5 DE-604 
689 4 0 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 4 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 4 |5 DE-604 
711 2 |a ICICS  |n 12  |d 2010  |c Barcelona  |j Sonstige  |0 (DE-588)16094528-8  |4 oth 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe, Paperback  |z 978-3-642-17649-4 
830 0 |a Lecture Notes in Computer Science  |v 6476  |w (DE-604)BV014880109  |9 6476 
856 4 0 |u https://doi.org/10.1007/978-3-642-17650-0  |x Verlag  |3 Volltext 
912 |a ZDB-2-LNC 
912 |a ZDB-2-SCS 
943 1 |a oai:aleph.bib-bvb.de:BVB01-021101725 

Datensatz im Suchindex

DE-BY-TUM_katkey 1754884
_version_ 1820874137422266368
any_adam_object
author Soriano, Miguel
author_facet Soriano, Miguel
author_role aut
author_sort Soriano, Miguel
author_variant m s ms
building Verbundindex
bvnumber BV037187230
classification_rvk SS 4800
classification_tum DAT 465f
DAT 461f
DAT 000
collection ZDB-2-LNC
ZDB-2-SCS
ctrlnum (OCoLC)1074265165
(DE-599)BVBBV037187230
discipline Informatik
doi_str_mv 10.1007/978-3-642-17650-0
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02874nam a2200709 cb4500</leader><controlfield tag="001">BV037187230</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">110126s2010 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642176500</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-17650-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-17650-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1074265165</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV037187230</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soriano, Miguel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings</subfield><subfield code="c">Miguel Soriano ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 474 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">6476</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Barcelona</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">12</subfield><subfield code="d">2010</subfield><subfield code="c">Barcelona</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16094528-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-17649-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">6476</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">6476</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-17650-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021101725</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2010 Barcelona gnd-content
genre_facet Konferenzschrift 2010 Barcelona
id DE-604.BV037187230
illustrated Illustrated
indexdate 2024-12-24T00:19:38Z
institution BVB
institution_GND (DE-588)16094528-8
isbn 9783642176500
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-021101725
oclc_num 1074265165
open_access_boolean
owner DE-473
DE-BY-UBG
DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-706
DE-739
DE-384
DE-M347
DE-20
DE-703
DE-634
owner_facet DE-473
DE-BY-UBG
DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-706
DE-739
DE-384
DE-M347
DE-20
DE-703
DE-634
physical 1 Online-Ressource (XIV, 474 S.) graph. Darst.
psigel ZDB-2-LNC
ZDB-2-SCS
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Soriano, Miguel
Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings
Lecture Notes in Computer Science
Datensicherung (DE-588)4011144-1 gnd
Anonymität (DE-588)4471050-1 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Authentifikation (DE-588)4330656-1 gnd
Trusted Computing (DE-588)7562931-8 gnd
Privatsphäre (DE-588)4123980-5 gnd
Kryptosystem (DE-588)4209132-9 gnd
subject_GND (DE-588)4011144-1
(DE-588)4471050-1
(DE-588)4293034-0
(DE-588)4830502-9
(DE-588)4274324-2
(DE-588)4330656-1
(DE-588)7562931-8
(DE-588)4123980-5
(DE-588)4209132-9
(DE-588)1071861417
title Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings
title_auth Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings
title_exact_search Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings
title_full Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.)
title_fullStr Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.)
title_full_unstemmed Information and communications security 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings Miguel Soriano ... (eds.)
title_short Information and communications security
title_sort information and communications security 12th international conference icics 2010 barcelona spain december 15 17 2010 proceedings
title_sub 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 ; proceedings
topic Datensicherung (DE-588)4011144-1 gnd
Anonymität (DE-588)4471050-1 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Authentifikation (DE-588)4330656-1 gnd
Trusted Computing (DE-588)7562931-8 gnd
Privatsphäre (DE-588)4123980-5 gnd
Kryptosystem (DE-588)4209132-9 gnd
topic_facet Datensicherung
Anonymität
Zugriffskontrolle
Kryptoanalyse
Computersicherheit
Authentifikation
Trusted Computing
Privatsphäre
Kryptosystem
Konferenzschrift 2010 Barcelona
url https://doi.org/10.1007/978-3-642-17650-0
volume_link (DE-604)BV014880109
work_keys_str_mv AT sorianomiguel informationandcommunicationssecurity12thinternationalconferenceicics2010barcelonaspaindecember15172010proceedings
AT icicsbarcelona informationandcommunicationssecurity12thinternationalconferenceicics2010barcelonaspaindecember15172010proceedings