Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6531 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV037195870 | ||
003 | DE-604 | ||
005 | 20110330 | ||
007 | t | ||
008 | 110131s2011 ad|| |||| 10||| eng d | ||
016 | 7 | |a 1008972649 |2 DE-101 | |
020 | |a 9783642181771 |9 978-3-642-18177-1 | ||
020 | |a 3642181775 |9 3-642-18177-5 | ||
035 | |a (OCoLC)706992676 | ||
035 | |a (DE-599)DNB1008972649 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Information Security |b 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers |c Mike Burmester .. (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIV, 446 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science; 6531 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Boca Raton Fla. |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 2 | 2 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | 1 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Burmester, Mike |e Sonstige |4 oth | |
711 | 2 | |a ISC |n 13 |d 2010 |c Boca Raton, Fla. |j Sonstige |0 (DE-588)16099079-8 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6531 |w (DE-604)BV000000607 |9 6531 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3631586&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021110226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-021110226 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102/DAT 001z 2001 A 999-6531 |
---|---|
DE-BY-TUM_katkey | 1761995 |
DE-BY-TUM_media_number | 040010206234 |
_version_ | 1816713575753842688 |
adam_text |
IMAGE 1
TABLE OF CONTENTS
ATTACKS AND ANALYSIS
IMPROVED COLLISION ATTACKS ON THE REDUCED-ROUND GR0STL HASH FUNCTION 1
KOTA IDEGUCHI, ELMAR TISCHHAUSER, AND BART PRENEEL
IMPROVED DISTINGUISHING ATTACK ON RABBIT 17
YI LU AND YVO DESMEDT
CRYPTANALYSIS OF THE CONVEX HULL CLICK HUMAN IDENTIFICATION PROTOCOL 24
HASSAN JAMEEL ASGHAR, SHUJUN LI, JOSEF PIEPRZYK, AND HUAXIONG WANG
AN ANALYSIS OF DEPENDNS 31
NADHEM J. ALFARDAN AND KENNETH G. PATERSON
ANALYSIS
SECURITY REDUCTIONS OF THE SECOND ROUND SHA-3 CANDIDATES 39 ELENA
ANDREEVA, BART MENNINK, AND BART PRENEEL
SECURITY ANALYSIS OF THE EXTENDED ACCESS CONTROL PROTOCOL FOR MACHINE
READABLE TRAVEL DOCUMENTS 54
OZGIIR DAGDELEN AND MARC FISCHLIN
REVISITING THE SECURITY OF THE ALRED DESIGN 69
MARCOS A. SIMPLICIO JR., PAULO S.L.M. BARRETO, AND TEREZA C.M.B.
CARVALHO
AUTHENTICATION, PIR AND CONTENT IDENTIFICATION
LIGHTWEIGHT ANONYMOUS AUTHENTICATION WITH TLS AND DAA FOR EMBEDDED
MOBILE DEVICES 84
CHRISTIAN WACHSMANN, LIQUN CHEN, KURT DIETRICH, HANS LB'HR, AHMAD-REZA
SADEGHI, AND JOHANNES WINTER
IMPLICIT AUTHENTICATION THROUGH LEARNING USER BEHAVIOR 99 ELAINE SHI,
YUAN NIU, MARKUS JAKOBSSON, AND RICHARD CHOW
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008972649
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
EFFICIENT COMPUTATIONALLY PRIVATE INFORMATION RETRIEVAL FROM ANONYMITY
OR TRAPDOOR GROUPS 114
JONATHAN TROSTLE AND ANDY PARRISH
VIDEO STREAMING FORENSIC - CONTENT IDENTIFICATION WITH TRAFFIC SNOOPING
129
YALI LIU, AHMAD-REZA SADEGHI, DIPAK GHOSAL, AND BISWANATH MUKHERJEE
PRIVACY
FAIR AND PRIVACY-PRESERVING MULTI-PARTY PROTOCOLS FOR RECONCILING
ORDERED INPUT SETS 136
GEORG NEUGEBAUER, ULRIKE MEYER, AND SUSANNE WETZEL
ENHANCING SECURITY AND PRIVACY IN CERTIFIED MAIL SYSTEMS USING TRUST
DOMAIN SEPARATION 152
ARNE TAUBER AND THOMAS ROESSLER
PRIVACY-PRESERVING ECC-BASED GROUPING PROOFS FOR RFID 159
LEJLA BATINA, YONG KI LEE, STEFAAN SEYS, DAVE SINGELEE, AND INGRID
VERBAUWHEDE
MALWARE, CRIMEWARE AND CODE INJECTION
ARTIFICIAL MALWARE IMMUNIZATION BASED ON DYNAMICALLY ASSIGNED SENSE OF
SELF 166
XINYUAN WANG AND XUXIAN JIANG
MISLEADING MALWARE SIMILARITIES ANALYSIS BY AUTOMATIC DATA STRUCTURE
OBFUSCATION 181
ZHI XIN, HUIYU CHEN, HAO HAN, BING MAO, AND LI XIE
CRIMEWARE SWINDLING WITHOUT VIRTUAL MACHINES 196
VASILIS PAPPAS, BRIAN M. BOWEN, AND ANGELOS D. KEROMYTIS
AN ARCHITECTURE FOR ENFORCING JAVASCRIPT RANDOMIZATION IN WEB2.0
APPLICATIONS 203
ELIAS ATHANASOPOULOS, ANTONIS KRITHINAKIS, AND EVANGELOS P. MARKATOS
INTRUSION DETECTION
SUMMARY-INVISIBLE NETWORKING: TECHNIQUES AND DEFENSES 210 LEI WEI,
MICHAEL K. REITER, AND KETAN MAYER-PATEL
SELECTIVE REGULAR EXPRESSION MATCHING 226
NATALIA STAKHANOVA, HANLI REN, AND ALI A. GHORBANI
IMAGE 3
TABLE OF CONTENTS XIII
TRACEABILITY OF EXECUTABLE CODES USING NEURAL NETWORKS 241 DAVIDSON R.
BOCCARDO, TIAGO M. NASCIMENTO, RAPHAEL C. MACHADO, CHARLES B. PRADO, AND
LUIZ F.R.C. CARMO
SIDE CHANNELS
ON SIDE-CHANNEL RESISTANT BLOCK CIPHER USAGE 254
JORGE GUAJARDO AND BART MENNINK
SECURITY IMPLICATIONS OF CROSSTALK IN SWITCHING CMOS GATES 269 GEIR OLAV
DYRKOLBOTN, KNUT WOLD, AND EINAR SNEKKENES
ON PRIVACY LEAKAGE THROUGH SILENCE SUPPRESSION 276
YEZHU
CRYPTOGRAPHY
ONE-TIME TRAPDOOR ONE-WAY FUNCTIONS 283
JULIEN CATHALO AND CHRISTOPHE PETIT
PUBLIC KEY ENCRYPTION SCHEMES WITH BOUNDED CCA SECURITY AND OPTIMAL
CIPHERTEXT LENGTH BASED ON THE CDH ASSUMPTION 299 MAYANA PEREIRA, RAFAEL
DOWSLEY, GOICHIRO HANAOKA, AND ANDERSON C.A. NASCIMENTO
A SHORT SIGNATURE SCHEME FROM THE RSA FAMILY 307
PING YU AND RUI XUE
EFFICIENT MESSAGE SPACE EXTENSION FOR AUTOMORPHIC SIGNATURES 319
MASAYUKI ABE, KRISTIYAN HARALAMBIEV, AND MIYAKO OHKUBO
SMARTPHONES
CREPE: CONTEXT-RELATED POLICY ENFORCEMENT FOR ANDROID 331 MAURO CONTI,
VU THIEN NGA NGUYEN, AND BRUNO CRISPO
PRIVILEGE ESCALATION ATTACKS ON ANDROID 346
LUCAS DAVI, ALEXANDRA DMITRIENKO, AHMAD-REZA SADEGHI, AND MARCEL WINANDY
BIOMETRICS
WALK THE WALK: ATTACKING GAIT BIOMETRICS BY IMITATION 361
BENDIK B. MJAALAND, PATRICK BOURS, AND DANILO GLIGOROSKI
IMAGE 4
XIV TABLE OF CONTENTS
CRYPTOGRAPHY, APPLICATION
EFFICIENT MULTIPLICATIVE HOMOMORPHIC E-VOTING 381
KUN PENG AND FENG BAO
D O U B LE S P E N D I NG P R O T E C T I ON FOR E - C A SH B A S ED ON
R I SK M A N A G E M E N T . . . 3 94
PATRICIA EVERAERE, ISABELLE SIMPLOT-RYL, AND ISSA TRAORE
BUFFER OVERFLOW
INTEGRATING OFFLINE ANALYSIS AND ONLINE PROTECTION TO DEFEAT BUFFER
OVERFLOW ATTACKS 409
DONGHAI TIAN, XI XIONG, CHANGZHEN HU, AND PENG LIU
CRYPTOGRAPHY, THEORY
DECIDING RECOGNIZABILITY UNDER DOLEV-YAO INTRUDER MODEL 416 ZHIWEI LI
AND WEICHAO WANG
INDIFFERENTIABLE SECURITY RECONSIDERED: ROLE OF SCHEDULING 430 KAZUKI
YONEYAMA
AUTHOR INDEX 445 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV037195870 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)706992676 (DE-599)DNB1008972649 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037195870</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110330</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110131s2011 ad|| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008972649</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642181771</subfield><subfield code="9">978-3-642-18177-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642181775</subfield><subfield code="9">3-642-18177-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706992676</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008972649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security</subfield><subfield code="b">13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers</subfield><subfield code="c">Mike Burmester .. (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 446 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science; 6531</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Boca Raton Fla.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burmester, Mike</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISC</subfield><subfield code="n">13</subfield><subfield code="d">2010</subfield><subfield code="c">Boca Raton, Fla.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16099079-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6531</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6531</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3631586&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021110226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021110226</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Boca Raton Fla. gnd-content |
genre_facet | Konferenzschrift 2010 Boca Raton Fla. |
id | DE-604.BV037195870 |
illustrated | Illustrated |
indexdate | 2024-11-25T17:37:10Z |
institution | BVB |
institution_GND | (DE-588)16099079-8 |
isbn | 9783642181771 3642181775 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-021110226 |
oclc_num | 706992676 |
open_access_boolean | |
owner | DE-706 DE-11 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-11 DE-83 DE-91G DE-BY-TUM |
physical | XIV, 446 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science; 6531 |
spellingShingle | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Kryptologie (DE-588)4033329-2 gnd Biometrie (DE-588)4124925-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4706627-1 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4687059-3 (DE-588)4033329-2 (DE-588)4124925-2 (DE-588)1071861417 |
title | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers |
title_auth | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers |
title_exact_search | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers |
title_full | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester .. (eds.) |
title_fullStr | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester .. (eds.) |
title_full_unstemmed | Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester .. (eds.) |
title_short | Information Security |
title_sort | information security 13th international conference isc 2010 boca raton fl usa october 25 28 2010 revised selected papers |
title_sub | 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers |
topic | Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Kryptologie (DE-588)4033329-2 gnd Biometrie (DE-588)4124925-2 gnd |
topic_facet | Datensicherung Authentifikation Eindringerkennung Kryptoanalyse Computersicherheit Malware Kryptologie Biometrie Konferenzschrift 2010 Boca Raton Fla. |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3631586&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021110226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT burmestermike informationsecurity13thinternationalconferenceisc2010bocaratonflusaoctober25282010revisedselectedpapers AT iscbocaratonfla informationsecurity13thinternationalconferenceisc2010bocaratonflusaoctober25282010revisedselectedpapers |