Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2011
Schriftenreihe:Lecture notes in computer science 6531
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV037195870
003 DE-604
005 20110330
007 t
008 110131s2011 ad|| |||| 10||| eng d
016 7 |a 1008972649  |2 DE-101 
020 |a 9783642181771  |9 978-3-642-18177-1 
020 |a 3642181775  |9 3-642-18177-5 
035 |a (OCoLC)706992676 
035 |a (DE-599)DNB1008972649 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706  |a DE-11  |a DE-83  |a DE-91G 
082 0 |a 005.8  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
084 |a DAT 460f  |2 stub 
084 |a DAT 050f  |2 stub 
245 1 0 |a Information Security  |b 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers  |c Mike Burmester .. (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2011 
300 |a XIV, 446 S.  |b Ill., graph. Darst.  |c 235 mm x 155 mm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science; 6531 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Biometrie  |0 (DE-588)4124925-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2010  |z Boca Raton Fla.  |2 gnd-content 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 1 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 2 2 |a Malware  |0 (DE-588)4687059-3  |D s 
689 2 |5 DE-604 
689 3 0 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 3 1 |a Biometrie  |0 (DE-588)4124925-2  |D s 
689 3 |5 DE-604 
700 1 |a Burmester, Mike  |e Sonstige  |4 oth 
711 2 |a ISC  |n 13  |d 2010  |c Boca Raton, Fla.  |j Sonstige  |0 (DE-588)16099079-8  |4 oth 
830 0 |a Lecture notes in computer science  |v 6531  |w (DE-604)BV000000607  |9 6531 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3631586&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021110226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-021110226 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102/DAT 001z 2001 A 999-6531
DE-BY-TUM_katkey 1761995
DE-BY-TUM_media_number 040010206234
_version_ 1816713575753842688
adam_text IMAGE 1 TABLE OF CONTENTS ATTACKS AND ANALYSIS IMPROVED COLLISION ATTACKS ON THE REDUCED-ROUND GR0STL HASH FUNCTION 1 KOTA IDEGUCHI, ELMAR TISCHHAUSER, AND BART PRENEEL IMPROVED DISTINGUISHING ATTACK ON RABBIT 17 YI LU AND YVO DESMEDT CRYPTANALYSIS OF THE CONVEX HULL CLICK HUMAN IDENTIFICATION PROTOCOL 24 HASSAN JAMEEL ASGHAR, SHUJUN LI, JOSEF PIEPRZYK, AND HUAXIONG WANG AN ANALYSIS OF DEPENDNS 31 NADHEM J. ALFARDAN AND KENNETH G. PATERSON ANALYSIS SECURITY REDUCTIONS OF THE SECOND ROUND SHA-3 CANDIDATES 39 ELENA ANDREEVA, BART MENNINK, AND BART PRENEEL SECURITY ANALYSIS OF THE EXTENDED ACCESS CONTROL PROTOCOL FOR MACHINE READABLE TRAVEL DOCUMENTS 54 OZGIIR DAGDELEN AND MARC FISCHLIN REVISITING THE SECURITY OF THE ALRED DESIGN 69 MARCOS A. SIMPLICIO JR., PAULO S.L.M. BARRETO, AND TEREZA C.M.B. CARVALHO AUTHENTICATION, PIR AND CONTENT IDENTIFICATION LIGHTWEIGHT ANONYMOUS AUTHENTICATION WITH TLS AND DAA FOR EMBEDDED MOBILE DEVICES 84 CHRISTIAN WACHSMANN, LIQUN CHEN, KURT DIETRICH, HANS LB'HR, AHMAD-REZA SADEGHI, AND JOHANNES WINTER IMPLICIT AUTHENTICATION THROUGH LEARNING USER BEHAVIOR 99 ELAINE SHI, YUAN NIU, MARKUS JAKOBSSON, AND RICHARD CHOW BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008972649 DIGITALISIERT DURCH IMAGE 2 XII TABLE OF CONTENTS EFFICIENT COMPUTATIONALLY PRIVATE INFORMATION RETRIEVAL FROM ANONYMITY OR TRAPDOOR GROUPS 114 JONATHAN TROSTLE AND ANDY PARRISH VIDEO STREAMING FORENSIC - CONTENT IDENTIFICATION WITH TRAFFIC SNOOPING 129 YALI LIU, AHMAD-REZA SADEGHI, DIPAK GHOSAL, AND BISWANATH MUKHERJEE PRIVACY FAIR AND PRIVACY-PRESERVING MULTI-PARTY PROTOCOLS FOR RECONCILING ORDERED INPUT SETS 136 GEORG NEUGEBAUER, ULRIKE MEYER, AND SUSANNE WETZEL ENHANCING SECURITY AND PRIVACY IN CERTIFIED MAIL SYSTEMS USING TRUST DOMAIN SEPARATION 152 ARNE TAUBER AND THOMAS ROESSLER PRIVACY-PRESERVING ECC-BASED GROUPING PROOFS FOR RFID 159 LEJLA BATINA, YONG KI LEE, STEFAAN SEYS, DAVE SINGELEE, AND INGRID VERBAUWHEDE MALWARE, CRIMEWARE AND CODE INJECTION ARTIFICIAL MALWARE IMMUNIZATION BASED ON DYNAMICALLY ASSIGNED SENSE OF SELF 166 XINYUAN WANG AND XUXIAN JIANG MISLEADING MALWARE SIMILARITIES ANALYSIS BY AUTOMATIC DATA STRUCTURE OBFUSCATION 181 ZHI XIN, HUIYU CHEN, HAO HAN, BING MAO, AND LI XIE CRIMEWARE SWINDLING WITHOUT VIRTUAL MACHINES 196 VASILIS PAPPAS, BRIAN M. BOWEN, AND ANGELOS D. KEROMYTIS AN ARCHITECTURE FOR ENFORCING JAVASCRIPT RANDOMIZATION IN WEB2.0 APPLICATIONS 203 ELIAS ATHANASOPOULOS, ANTONIS KRITHINAKIS, AND EVANGELOS P. MARKATOS INTRUSION DETECTION SUMMARY-INVISIBLE NETWORKING: TECHNIQUES AND DEFENSES 210 LEI WEI, MICHAEL K. REITER, AND KETAN MAYER-PATEL SELECTIVE REGULAR EXPRESSION MATCHING 226 NATALIA STAKHANOVA, HANLI REN, AND ALI A. GHORBANI IMAGE 3 TABLE OF CONTENTS XIII TRACEABILITY OF EXECUTABLE CODES USING NEURAL NETWORKS 241 DAVIDSON R. BOCCARDO, TIAGO M. NASCIMENTO, RAPHAEL C. MACHADO, CHARLES B. PRADO, AND LUIZ F.R.C. CARMO SIDE CHANNELS ON SIDE-CHANNEL RESISTANT BLOCK CIPHER USAGE 254 JORGE GUAJARDO AND BART MENNINK SECURITY IMPLICATIONS OF CROSSTALK IN SWITCHING CMOS GATES 269 GEIR OLAV DYRKOLBOTN, KNUT WOLD, AND EINAR SNEKKENES ON PRIVACY LEAKAGE THROUGH SILENCE SUPPRESSION 276 YEZHU CRYPTOGRAPHY ONE-TIME TRAPDOOR ONE-WAY FUNCTIONS 283 JULIEN CATHALO AND CHRISTOPHE PETIT PUBLIC KEY ENCRYPTION SCHEMES WITH BOUNDED CCA SECURITY AND OPTIMAL CIPHERTEXT LENGTH BASED ON THE CDH ASSUMPTION 299 MAYANA PEREIRA, RAFAEL DOWSLEY, GOICHIRO HANAOKA, AND ANDERSON C.A. NASCIMENTO A SHORT SIGNATURE SCHEME FROM THE RSA FAMILY 307 PING YU AND RUI XUE EFFICIENT MESSAGE SPACE EXTENSION FOR AUTOMORPHIC SIGNATURES 319 MASAYUKI ABE, KRISTIYAN HARALAMBIEV, AND MIYAKO OHKUBO SMARTPHONES CREPE: CONTEXT-RELATED POLICY ENFORCEMENT FOR ANDROID 331 MAURO CONTI, VU THIEN NGA NGUYEN, AND BRUNO CRISPO PRIVILEGE ESCALATION ATTACKS ON ANDROID 346 LUCAS DAVI, ALEXANDRA DMITRIENKO, AHMAD-REZA SADEGHI, AND MARCEL WINANDY BIOMETRICS WALK THE WALK: ATTACKING GAIT BIOMETRICS BY IMITATION 361 BENDIK B. MJAALAND, PATRICK BOURS, AND DANILO GLIGOROSKI IMAGE 4 XIV TABLE OF CONTENTS CRYPTOGRAPHY, APPLICATION EFFICIENT MULTIPLICATIVE HOMOMORPHIC E-VOTING 381 KUN PENG AND FENG BAO D O U B LE S P E N D I NG P R O T E C T I ON FOR E - C A SH B A S ED ON R I SK M A N A G E M E N T . . . 3 94 PATRICIA EVERAERE, ISABELLE SIMPLOT-RYL, AND ISSA TRAORE BUFFER OVERFLOW INTEGRATING OFFLINE ANALYSIS AND ONLINE PROTECTION TO DEFEAT BUFFER OVERFLOW ATTACKS 409 DONGHAI TIAN, XI XIONG, CHANGZHEN HU, AND PENG LIU CRYPTOGRAPHY, THEORY DECIDING RECOGNIZABILITY UNDER DOLEV-YAO INTRUDER MODEL 416 ZHIWEI LI AND WEICHAO WANG INDIFFERENTIABLE SECURITY RECONSIDERED: ROLE OF SCHEDULING 430 KAZUKI YONEYAMA AUTHOR INDEX 445
any_adam_object 1
building Verbundindex
bvnumber BV037195870
classification_rvk SS 4800
classification_tum DAT 460f
DAT 050f
ctrlnum (OCoLC)706992676
(DE-599)DNB1008972649
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV037195870</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110330</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110131s2011 ad|| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008972649</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642181771</subfield><subfield code="9">978-3-642-18177-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642181775</subfield><subfield code="9">3-642-18177-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706992676</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008972649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security</subfield><subfield code="b">13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers</subfield><subfield code="c">Mike Burmester .. (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 446 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science; 6531</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Boca Raton Fla.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Burmester, Mike</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISC</subfield><subfield code="n">13</subfield><subfield code="d">2010</subfield><subfield code="c">Boca Raton, Fla.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16099079-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6531</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6531</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3631586&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=021110226&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-021110226</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2010 Boca Raton Fla. gnd-content
genre_facet Konferenzschrift 2010 Boca Raton Fla.
id DE-604.BV037195870
illustrated Illustrated
indexdate 2024-11-25T17:37:10Z
institution BVB
institution_GND (DE-588)16099079-8
isbn 9783642181771
3642181775
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-021110226
oclc_num 706992676
open_access_boolean
owner DE-706
DE-11
DE-83
DE-91G
DE-BY-TUM
owner_facet DE-706
DE-11
DE-83
DE-91G
DE-BY-TUM
physical XIV, 446 S. Ill., graph. Darst. 235 mm x 155 mm
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science; 6531
spellingShingle Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
Lecture notes in computer science
Datensicherung (DE-588)4011144-1 gnd
Authentifikation (DE-588)4330656-1 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Malware (DE-588)4687059-3 gnd
Kryptologie (DE-588)4033329-2 gnd
Biometrie (DE-588)4124925-2 gnd
subject_GND (DE-588)4011144-1
(DE-588)4330656-1
(DE-588)4706627-1
(DE-588)4830502-9
(DE-588)4274324-2
(DE-588)4687059-3
(DE-588)4033329-2
(DE-588)4124925-2
(DE-588)1071861417
title Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
title_auth Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
title_exact_search Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
title_full Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester .. (eds.)
title_fullStr Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester .. (eds.)
title_full_unstemmed Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Mike Burmester .. (eds.)
title_short Information Security
title_sort information security 13th international conference isc 2010 boca raton fl usa october 25 28 2010 revised selected papers
title_sub 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
topic Datensicherung (DE-588)4011144-1 gnd
Authentifikation (DE-588)4330656-1 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Malware (DE-588)4687059-3 gnd
Kryptologie (DE-588)4033329-2 gnd
Biometrie (DE-588)4124925-2 gnd
topic_facet Datensicherung
Authentifikation
Eindringerkennung
Kryptoanalyse
Computersicherheit
Malware
Kryptologie
Biometrie
Konferenzschrift 2010 Boca Raton Fla.
url http://deposit.dnb.de/cgi-bin/dokserv?id=3631586&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=021110226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT burmestermike informationsecurity13thinternationalconferenceisc2010bocaratonflusaoctober25282010revisedselectedpapers
AT iscbocaratonfla informationsecurity13thinternationalconferenceisc2010bocaratonflusaoctober25282010revisedselectedpapers