Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
7043 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039713636 | ||
003 | DE-604 | ||
005 | 20111212 | ||
007 | t | ||
008 | 111121s2011 ad|| |||| 10||| eng d | ||
015 | |a 11,N42 |2 dnb | ||
016 | 7 | |a 1016104499 |2 DE-101 | |
020 | |a 3642252427 |9 3-642-25242-7 | ||
020 | |a 9783642252426 |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.) |9 978-3-642-25242-6 | ||
024 | 3 | |a 9783642252426 | |
028 | 5 | 2 | |a Best.-Nr.: 86007574 |
035 | |a (OCoLC)908259174 | ||
035 | |a (DE-599)DNB1016104499 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-83 |a DE-91G |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information and communications security |b 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings |c Sihan Qing ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIV, 432 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7043 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 4 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Qing, Sihan |e Sonstige |4 oth | |
711 | 2 | |a ICICS |n 13 |d 2011 |c Peking |j Sonstige |0 (DE-588)16330433-6 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-25243-3 |
830 | 0 | |a Lecture notes in computer science |v 7043 |w (DE-604)BV000000607 |9 7043 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3896872&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024561920&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024561920 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102/DAT 001z 2001 A 999-7043 |
---|---|
DE-BY-TUM_katkey | 1803989 |
DE-BY-TUM_media_number | 040010219397 |
_version_ | 1816713692087058432 |
adam_text |
IMAGE 1
TABLE OF CONTENTS
DIGITAL SIGNATURES FORWARD SECURE RING SIGNATURE WITHOUT RANDOM ORACLES
1
JOSEPH K. LIU, TSZ HON YUEN, AND JIANYING ZHOU
RING SIGNATURE SCHEMES FROM LATTICE BASIS DELEGATION 15
JIN WANG AND BO SUN
PUBLIC KEY ENCRYPTION
COMPUTATIONAL SOUNDNESS ABOUT FORMAL ENCRYPTION IN THE PRESENCE OF
SECRET SHARES AND KEY CYCLES 29
XINFENG LEI, RUI XUE, AND TING YU
A VARIANT OF BOYEN-WATERS ANONYMOUS IBE SCHEME 42
SONG LUO, QINGNI SHEN, YONGMING JIN, YU CHEN, ZHONG CHEN, AND SIHAN QING
NON-INTERACTIVE OPENING FOR CIPHERTEXTS ENCRYPTED BY SHARED KEYS . . .
57 JIAGENG CHEN, KEITA EMURA, AND ATSUKO MIYAJI
CRYPTOGRAPHIC PROTOCOLS
LIGHTWEIGHT RFID MUTUAL AUTHENTICATION PROTOCOL AGAINST FEASIBLE
PROBLEMS 69
YONGMING JIN, HUIPING SUN, WEI XIN, SONG LUO, AND ZHONG CHEN
A NOTE ON A PRIVACY-PRESERVING DISTANCE-BOUNDING PROTOCOL 78
JEAN-PHILIPPE AUMASSON, AIKATERINI MITROKOTSA, AND PEDRO PERIS-LOPEZ
DELEGABLE PROVABLE DATA POSSESSION FOR REMOTE DATA IN THE CLOUDS 93
SHIUAN-TZUO SHEN AND WEN-GUEY TZENG
U N C O N D I T I O N A L LY S E C U RE O B L I V I O US T R A N S F ER
B A S ED ON C H A N N EL D E L A YS . . 112 KAI- YUEN CHEONG AND ATSUKO
MIYAJI
APPLIED CRYPTOGRAPHY
PRESERVING SECURITY AND PRIVACY IN LARGE-SCALE VANETS 121 BO QIN,
QIANHONG WU, JOSEP DOMINGO-FERRER, AND LEI ZHANG
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016104499
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
A PROBABILISTIC SECRET SHARING SCHEME FOR A COMPARTMENTED ACCESS
STRUCTURE 136
YUYIN YU AND MINGSHENG WANG
IDEAL SECRET SHARING SCHEMES WITH SHARE SELECTABILITY 143
KEITA EMURA, ATSUKO MIYAJI, AKITO NOMURA, MOHAMMAD SHAHRIAR RAHMAN, AND
MASAKAZU SOSHI
MULTIMEDIA SECURITY
A NOVEL PYRAMIDAL DUAL-TREE DIRECTIONAL FILTER BANK DOMAIN COLOR IMAGE
WATERMARKING ALGORITHM 158
PANPAN NIU, XIANGYANG WANG, AND MINGYU LU
DETECTION FOR MULTIPLICATIVE WATERMARKING IN DCT DOMAIN BY CAUCHY MODEL
173
XIANG YIN, SHUOLING PENG, AND XINSHAN ZHU
ALGORITHMS AND EVALUATION
EXTENSION OF BARRETO-VOLOCH ROOT EXTRACTION METHOD 184
ZHENGJUN CAO AND XIAO FAN
TWO APPLICATIONS OF AN INCOMPLETE ADDITIVE CHARACTER SUM TO ESTIMATING
NONLINEARITY OF BOOLEAN FUNCTIONS 190
YUSONG DU AND FANGGUO ZHANG
EVALUATING OPTIMIZED IMPLEMENTATIONS OF STREAM CIPHER ZUC ALGORITHM ON
FPGA 202
LEI WANG, JIWU JING, ZONGBIN LIU, LINGCHEN ZHANG, AND WUQIONG PAN
CRYPTANALYSIS
FIRST DIFFERENTIAL ATTACK ON FULL 32-ROUND GOST 216
NICOLAS T. COURTOIS AND MICHAL MISZTAL
COLLISION ATTACK FOR THE HASH FUNCTION EXTENDED MD4 228
GAOLI WANG
LINEAR CRYPTANALYSIS OF ARIA BLOCK CIPHER 242
ZHIQIANG LIU, DAUM GU, YA LIU, JUANRU LI, AND WEI LI
LATIN DANCES REVISITED: NEW ANALYTIC RESULTS OF SALSA20 AND CHACHA 255
TSUKASA ISHIGURO, SHINSAKU KIYOMOTO, AND YUTAKA MIYAKE
IMAGE 3
TABLE OF CONTENTS XIII
SECURITY APPLICATIONS
BEHAVIOR ANALYSIS-BASED DYNAMIC TRUST MEASUREMENT MODEL 267 DAN WANG,
XIAODONG ZHOU, AND WENBING ZHAO
IMPROVEMENT AND ANALYSIS OF VDP METHOD IN TIME/MEMORY TRADEOFF
APPLICATIONS 282
WENHAO WANG, DONGDAI LIN, ZHENQI LI, AND TIANZE WANG
ANALYZING THE PERFORMANCE OF DITHER MODULATION IN PRESENCE OF COMPOSITE
ATTACKS 297
XINSHAN ZHU
WIRELESS NETWORK SECURITY
APPLYING TIME-BOUND HIERARCHICAL KEY ASSIGNMENT IN WIRELESS SENSOR
NETWORKS 306
WEN TAO ZHU, ROBERT H. DENG, JIANYING ZHOU, AND FENG BAO
A UNIFIED SECURITY FRAMEWORK FOR MULTI-DOMAIN WIRELESS MESH NETWORKS 319
ZE WANG, MAODE MA, WENJU LIU, AND XIXI WEI
SYSTEM SECURITY
ONTOLOGY MODEL-BASED STATIC ANALYSIS OF SECURITY VULNERABILITIES 330
LIAN YU, SHI-ZHONG WU, TAO GUO, GUO-WEI DONG, CHENG-CHENG WAN, AND
YIN-HANG JING
A MULTI-COMPOSITIONAL ENFORCEMENT ON INFORMATION FLOW SECURITY 345 CONG
SUN, ENNAN ZHAI, ZHONG CHEN, AND JIANFENG MA
HYPERCROP: A HYPERVISOR-BASED COUNTERMEASURE FOR RETURN ORIENTED
PROGRAMMING 360
JUN JIANG, XIAOQI JIA, DENGGUO FENG, SHENGZHI ZHANG, AND PENG LIU
AN EFFICIENT FINGER-KNUCKLE-PRINT BASED RECOGNITION SYSTEM FUSING SIFT
AND SURF MATCHING SCORES 374
G.S. BADRINATH, ADITYA NIGAM, AND PHALGUNI GUPTA
NETWORK SECURITY
MULTIVARIATE CORRELATION ANALYSIS TECHNIQUE BASED ON EUCLIDEAN DISTANCE
MAP FOR NETWORK TRAFFIC CHARACTERIZATION 388
ZHIYUAN TAN, ARUNA JAMDAGNI, XIANGJIAN HE, PRIYADARSI NANDA, AND REN
PING LIU
IMAGE 4
XIV TABLE OF CONTENTS
SITUATIONAL ASSESSMENT OF INTRUSION ALERTS: A MULTI ATTACK SCENARIO
EVALUATION 399
HADI SHIRAVI, ALI SHIRAVI, AND ALI A. GHORBANI
MINIMISING ANONYMITY LOSS IN ANONYMITY NETWORKS UNDER DOS ATTACKS 414
MU YANG AND VLADIMIRO SASSONE
AUTHOR INDEX 431 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV039713636 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)908259174 (DE-599)DNB1016104499 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039713636</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111212</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111121s2011 ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N42</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016104499</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642252427</subfield><subfield code="9">3-642-25242-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642252426</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-25242-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642252426</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86007574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908259174</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016104499</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings</subfield><subfield code="c">Sihan Qing ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 432 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7043</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qing, Sihan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">13</subfield><subfield code="d">2011</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16330433-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-25243-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7043</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7043</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3896872&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024561920&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024561920</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Peking gnd-content |
genre_facet | Konferenzschrift 2011 Peking |
id | DE-604.BV039713636 |
illustrated | Illustrated |
indexdate | 2024-11-25T17:37:10Z |
institution | BVB |
institution_GND | (DE-588)16330433-6 |
isbn | 3642252427 9783642252426 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024561920 |
oclc_num | 908259174 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
physical | XIV, 432 S. Ill., graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings |
title_auth | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings |
title_exact_search | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings |
title_full | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Sihan Qing ... (eds.) |
title_fullStr | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Sihan Qing ... (eds.) |
title_full_unstemmed | Information and communications security 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings Sihan Qing ... (eds.) |
title_short | Information and communications security |
title_sort | information and communications security 13th international conference icics 2011 beijing china november 23 26 2011 proceedings |
title_sub | 13th international conference, ICICS 2011, Beijing, China, November 23 - 26, 2011 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Datensicherung Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Kryptologie Sicherheitsprotokoll Konferenzschrift 2011 Peking |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3896872&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024561920&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT qingsihan informationandcommunicationssecurity13thinternationalconferenceicics2011beijingchinanovember23262011proceedings AT icicspeking informationandcommunicationssecurity13thinternationalconferenceicics2011beijingchinanovember23262011proceedings |