Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2011
Schriftenreihe:Lecture notes in computer science 7043
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV039713636
003 DE-604
005 20111212
007 t
008 111121s2011 ad|| |||| 10||| eng d
015 |a 11,N42  |2 dnb 
016 7 |a 1016104499  |2 DE-101 
020 |a 3642252427  |9 3-642-25242-7 
020 |a 9783642252426  |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)  |9 978-3-642-25242-6 
024 3 |a 9783642252426 
028 5 2 |a Best.-Nr.: 86007574 
035 |a (OCoLC)908259174 
035 |a (DE-599)DNB1016104499 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706  |a DE-83  |a DE-91G  |a DE-11 
082 0 |a 005.8  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
084 |a DAT 461f  |2 stub 
084 |a DAT 465f  |2 stub 
245 1 0 |a Information and communications security  |b 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings  |c Sihan Qing ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2011 
300 |a XIV, 432 S.  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7043 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2011  |z Peking  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 3 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 4 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 1 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 1 |5 DE-604 
700 1 |a Qing, Sihan  |e Sonstige  |4 oth 
711 2 |a ICICS  |n 13  |d 2011  |c Peking  |j Sonstige  |0 (DE-588)16330433-6  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-25243-3 
830 0 |a Lecture notes in computer science  |v 7043  |w (DE-604)BV000000607  |9 7043 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3896872&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024561920&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024561920 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102/DAT 001z 2001 A 999-7043
DE-BY-TUM_katkey 1803989
DE-BY-TUM_media_number 040010219397
_version_ 1816713692087058432
adam_text IMAGE 1 TABLE OF CONTENTS DIGITAL SIGNATURES FORWARD SECURE RING SIGNATURE WITHOUT RANDOM ORACLES 1 JOSEPH K. LIU, TSZ HON YUEN, AND JIANYING ZHOU RING SIGNATURE SCHEMES FROM LATTICE BASIS DELEGATION 15 JIN WANG AND BO SUN PUBLIC KEY ENCRYPTION COMPUTATIONAL SOUNDNESS ABOUT FORMAL ENCRYPTION IN THE PRESENCE OF SECRET SHARES AND KEY CYCLES 29 XINFENG LEI, RUI XUE, AND TING YU A VARIANT OF BOYEN-WATERS ANONYMOUS IBE SCHEME 42 SONG LUO, QINGNI SHEN, YONGMING JIN, YU CHEN, ZHONG CHEN, AND SIHAN QING NON-INTERACTIVE OPENING FOR CIPHERTEXTS ENCRYPTED BY SHARED KEYS . . . 57 JIAGENG CHEN, KEITA EMURA, AND ATSUKO MIYAJI CRYPTOGRAPHIC PROTOCOLS LIGHTWEIGHT RFID MUTUAL AUTHENTICATION PROTOCOL AGAINST FEASIBLE PROBLEMS 69 YONGMING JIN, HUIPING SUN, WEI XIN, SONG LUO, AND ZHONG CHEN A NOTE ON A PRIVACY-PRESERVING DISTANCE-BOUNDING PROTOCOL 78 JEAN-PHILIPPE AUMASSON, AIKATERINI MITROKOTSA, AND PEDRO PERIS-LOPEZ DELEGABLE PROVABLE DATA POSSESSION FOR REMOTE DATA IN THE CLOUDS 93 SHIUAN-TZUO SHEN AND WEN-GUEY TZENG U N C O N D I T I O N A L LY S E C U RE O B L I V I O US T R A N S F ER B A S ED ON C H A N N EL D E L A YS . . 112 KAI- YUEN CHEONG AND ATSUKO MIYAJI APPLIED CRYPTOGRAPHY PRESERVING SECURITY AND PRIVACY IN LARGE-SCALE VANETS 121 BO QIN, QIANHONG WU, JOSEP DOMINGO-FERRER, AND LEI ZHANG BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016104499 DIGITALISIERT DURCH IMAGE 2 XII TABLE OF CONTENTS A PROBABILISTIC SECRET SHARING SCHEME FOR A COMPARTMENTED ACCESS STRUCTURE 136 YUYIN YU AND MINGSHENG WANG IDEAL SECRET SHARING SCHEMES WITH SHARE SELECTABILITY 143 KEITA EMURA, ATSUKO MIYAJI, AKITO NOMURA, MOHAMMAD SHAHRIAR RAHMAN, AND MASAKAZU SOSHI MULTIMEDIA SECURITY A NOVEL PYRAMIDAL DUAL-TREE DIRECTIONAL FILTER BANK DOMAIN COLOR IMAGE WATERMARKING ALGORITHM 158 PANPAN NIU, XIANGYANG WANG, AND MINGYU LU DETECTION FOR MULTIPLICATIVE WATERMARKING IN DCT DOMAIN BY CAUCHY MODEL 173 XIANG YIN, SHUOLING PENG, AND XINSHAN ZHU ALGORITHMS AND EVALUATION EXTENSION OF BARRETO-VOLOCH ROOT EXTRACTION METHOD 184 ZHENGJUN CAO AND XIAO FAN TWO APPLICATIONS OF AN INCOMPLETE ADDITIVE CHARACTER SUM TO ESTIMATING NONLINEARITY OF BOOLEAN FUNCTIONS 190 YUSONG DU AND FANGGUO ZHANG EVALUATING OPTIMIZED IMPLEMENTATIONS OF STREAM CIPHER ZUC ALGORITHM ON FPGA 202 LEI WANG, JIWU JING, ZONGBIN LIU, LINGCHEN ZHANG, AND WUQIONG PAN CRYPTANALYSIS FIRST DIFFERENTIAL ATTACK ON FULL 32-ROUND GOST 216 NICOLAS T. COURTOIS AND MICHAL MISZTAL COLLISION ATTACK FOR THE HASH FUNCTION EXTENDED MD4 228 GAOLI WANG LINEAR CRYPTANALYSIS OF ARIA BLOCK CIPHER 242 ZHIQIANG LIU, DAUM GU, YA LIU, JUANRU LI, AND WEI LI LATIN DANCES REVISITED: NEW ANALYTIC RESULTS OF SALSA20 AND CHACHA 255 TSUKASA ISHIGURO, SHINSAKU KIYOMOTO, AND YUTAKA MIYAKE IMAGE 3 TABLE OF CONTENTS XIII SECURITY APPLICATIONS BEHAVIOR ANALYSIS-BASED DYNAMIC TRUST MEASUREMENT MODEL 267 DAN WANG, XIAODONG ZHOU, AND WENBING ZHAO IMPROVEMENT AND ANALYSIS OF VDP METHOD IN TIME/MEMORY TRADEOFF APPLICATIONS 282 WENHAO WANG, DONGDAI LIN, ZHENQI LI, AND TIANZE WANG ANALYZING THE PERFORMANCE OF DITHER MODULATION IN PRESENCE OF COMPOSITE ATTACKS 297 XINSHAN ZHU WIRELESS NETWORK SECURITY APPLYING TIME-BOUND HIERARCHICAL KEY ASSIGNMENT IN WIRELESS SENSOR NETWORKS 306 WEN TAO ZHU, ROBERT H. DENG, JIANYING ZHOU, AND FENG BAO A UNIFIED SECURITY FRAMEWORK FOR MULTI-DOMAIN WIRELESS MESH NETWORKS 319 ZE WANG, MAODE MA, WENJU LIU, AND XIXI WEI SYSTEM SECURITY ONTOLOGY MODEL-BASED STATIC ANALYSIS OF SECURITY VULNERABILITIES 330 LIAN YU, SHI-ZHONG WU, TAO GUO, GUO-WEI DONG, CHENG-CHENG WAN, AND YIN-HANG JING A MULTI-COMPOSITIONAL ENFORCEMENT ON INFORMATION FLOW SECURITY 345 CONG SUN, ENNAN ZHAI, ZHONG CHEN, AND JIANFENG MA HYPERCROP: A HYPERVISOR-BASED COUNTERMEASURE FOR RETURN ORIENTED PROGRAMMING 360 JUN JIANG, XIAOQI JIA, DENGGUO FENG, SHENGZHI ZHANG, AND PENG LIU AN EFFICIENT FINGER-KNUCKLE-PRINT BASED RECOGNITION SYSTEM FUSING SIFT AND SURF MATCHING SCORES 374 G.S. BADRINATH, ADITYA NIGAM, AND PHALGUNI GUPTA NETWORK SECURITY MULTIVARIATE CORRELATION ANALYSIS TECHNIQUE BASED ON EUCLIDEAN DISTANCE MAP FOR NETWORK TRAFFIC CHARACTERIZATION 388 ZHIYUAN TAN, ARUNA JAMDAGNI, XIANGJIAN HE, PRIYADARSI NANDA, AND REN PING LIU IMAGE 4 XIV TABLE OF CONTENTS SITUATIONAL ASSESSMENT OF INTRUSION ALERTS: A MULTI ATTACK SCENARIO EVALUATION 399 HADI SHIRAVI, ALI SHIRAVI, AND ALI A. GHORBANI MINIMISING ANONYMITY LOSS IN ANONYMITY NETWORKS UNDER DOS ATTACKS 414 MU YANG AND VLADIMIRO SASSONE AUTHOR INDEX 431
any_adam_object 1
building Verbundindex
bvnumber BV039713636
classification_rvk SS 4800
classification_tum DAT 461f
DAT 465f
ctrlnum (OCoLC)908259174
(DE-599)DNB1016104499
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039713636</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111212</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111121s2011 ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N42</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016104499</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642252427</subfield><subfield code="9">3-642-25242-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642252426</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-25242-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642252426</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86007574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908259174</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016104499</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings</subfield><subfield code="c">Sihan Qing ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 432 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7043</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qing, Sihan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">13</subfield><subfield code="d">2011</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16330433-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-25243-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7043</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7043</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3896872&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024561920&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024561920</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2011 Peking gnd-content
genre_facet Konferenzschrift 2011 Peking
id DE-604.BV039713636
illustrated Illustrated
indexdate 2024-11-25T17:37:10Z
institution BVB
institution_GND (DE-588)16330433-6
isbn 3642252427
9783642252426
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024561920
oclc_num 908259174
open_access_boolean
owner DE-706
DE-83
DE-91G
DE-BY-TUM
DE-11
owner_facet DE-706
DE-83
DE-91G
DE-BY-TUM
DE-11
physical XIV, 432 S. Ill., graph. Darst.
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings
Lecture notes in computer science
Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptosystem (DE-588)4209132-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kryptologie (DE-588)4033329-2 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
subject_GND (DE-588)4011144-1
(DE-588)4070085-9
(DE-588)4209132-9
(DE-588)4830502-9
(DE-588)4274324-2
(DE-588)4033329-2
(DE-588)4709127-7
(DE-588)1071861417
title Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings
title_auth Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings
title_exact_search Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings
title_full Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Sihan Qing ... (eds.)
title_fullStr Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Sihan Qing ... (eds.)
title_full_unstemmed Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Sihan Qing ... (eds.)
title_short Information and communications security
title_sort information and communications security 13th international conference icics 2011 beijing china november 23 26 2011 proceedings
title_sub 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings
topic Datensicherung (DE-588)4011144-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptosystem (DE-588)4209132-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kryptologie (DE-588)4033329-2 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
topic_facet Datensicherung
Rechnernetz
Kryptosystem
Kryptoanalyse
Computersicherheit
Kryptologie
Sicherheitsprotokoll
Konferenzschrift 2011 Peking
url http://deposit.dnb.de/cgi-bin/dokserv?id=3896872&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024561920&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT qingsihan informationandcommunicationssecurity13thinternationalconferenceicics2011beijingchinanovember23262011proceedings
AT icicspeking informationandcommunicationssecurity13thinternationalconferenceicics2011beijingchinanovember23262011proceedings