Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2012
Schriftenreihe:Lecture notes in computer science 7618
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV040508630
003 DE-604
005 20121214
007 t|
008 121029s2012 gw d||| |||| 10||| eng d
015 |a 12,N38  |2 dnb 
016 7 |a 1025944763  |2 DE-101 
020 |a 3642341284  |9 3-642-34128-4 
020 |a 9783642341281  |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)  |9 978-3-642-34128-1 
024 3 |a 9783642341281 
028 5 2 |a Best.-Nr.: 86163584 
035 |a (OCoLC)816345319 
035 |a (DE-599)DNB1025944763 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-706  |a DE-83  |a DE-11  |a DE-91G 
082 0 |a 005.8  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 465f  |2 stub 
084 |a DAT 461f  |2 stub 
084 |a 004  |2 sdnb 
245 1 0 |a Information and communications security  |b 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings  |c Tat Wing Chim ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2012 
300 |a XV, 506 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7618 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2012  |z Hongkong  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 2 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 3 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 4 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 1 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 1 |5 DE-604 
700 1 |a Chim, Tat Wing  |e Sonstige  |0 (DE-588)1027271278  |4 oth 
711 2 |a ICICS  |n 14  |d 2012  |c Hongkong  |j Sonstige  |0 (DE-588)1027271340  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-34129-8 
830 0 |a Lecture notes in computer science  |v 7618  |w (DE-604)BV000000607  |9 7618 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=4121753&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025355215&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-025355215 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1903068
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040071428025
_version_ 1820852535411343360
adam_text IMAGE 1 TABLE O F C O N T E N T S PULL P A P E R S A P P L I E D C R Y P T O G R A P H Y AUDIO STEGANALYSIS BASED ON LOSSLESS DATA-COMPRESSION TECHNIQUES . . . . 1 FATIHA DJEBBAR AND BEGHDAD A Y AD ENHANCING THE PERCEIVED VISUAL QUALITY OF A SIZE INVARIANT VISUAL CRYPTOGRAPHY SCHEME 10 YANG-WAI CHOW. WILLY SUSILO. AND DUNCAN S. WONG IMPACT OF THE REVOCATION SERVICE IN P K I PRICES 22 CARLOS GANDN. JOSE L. MUNOZ, OSCAR ESPARZA, JORGE MATA-DIAZ, AND JUANJO ALIUS C R Y P T A N A L Y S I S CRYPTANALYSIS OF MULTI-PRIME RSA WITH SMALL PRIME DIFFERENCE 33 HATEM M. BAHIG, ASHRAF BHERY, AND DIEAA I. NASSR IMPLICIT POLYNOMIAL RECOVERY AND CRYPTANALYSIS OF A COMBINATORIAL KEY CRYPTOSYSTEM 45 JUN XU, LEI HU, AND SIWEI S U N IMPROVED RELATED-KEY DIFFERENTIAL ATTACKS ON REDUCED-ROUND LBLOCK 58 SHUSHENG LIU, ZHENG GONG, AND LIBIN WANG N E T W O R K S E C U R I T Y COUNTERMEASURES ON APPLICATION LEVEL LOW-RATE DENIAL-OF-SERVICE ATTACK 70 YAJUAN TANG FIREWALL PACKET FILTERING OPTIMIZATION USING STATISTICAL TRAFFIC AWARENESS TEST 81 ZOUHEIR TRABELSI, LIREN ZHANG, AND SAFAA ZEIDAN GROUP BEHAVIOR METRICS FOR P 2 P BOTNET DETECTION 93 JOHN FELIX. CHARLES JOSEPH, AND AH A. GHORBANI HTTP://D-NB.INFO/1025944763 IMAGE 2 XII TABLE OF CONTENTS O P T I M I Z A T I O N HARDWARE PERFORMANCE OPTIMIZATION AND EVALUATION OF SM3 HASH ALGORITHM ON F P G A 105 YUAN MA, LUNING XIA, JINGQIANG LIN, JIWU JING, ZONGBIN LIU, AND XINGJIE YU P R I V A C Y CONTINUAL LEAKAGE-RESILIENT DYNAMIC SECRET SHARING IN THE SPLIT-STATE MODEL 119 HAO XIONG, CONG ZHANG, TSZ HON YUEN, ECHO P. ZHANG, SIU MING YIU, AND SIHAN QING CONVERSION OF REAL-NUMBERED PRIVACY-PRESERVING PROBLEMS INTO THE INTEGER DOMAIN 131 WILKO HENECKA, NIGEL BEAN, AND MATTHEW ROUGHAN PERFECT AMBIGUOUS OPTIMISTIC FAIR EXCHANGE 142 YANG WANG, MAN HO AU, AND WILLY SUSILO PRIVACY-PRESERVING NOISY KEYWORD SEARCH IN CLOUD COMPUTING 154 XIAOQIONG PANG, BO YANG, AND QIONG HUANG P R O T O C O L S FORWARD SECURE ATTRIBUTE-BASED SIGNATURES 167 TSZ HON YUEN, JOSEPH K. LIU, XINYI HUANG, MAN HO A U , WILLY SUSILO, AND JIANYING ZHOU ON CONSTANT-ROUND PRECISE ZERO-KNOWLEDGE 178 NING DING AND DAWU GU OUTSOURCING ENCRYPTION OF ATTRIBUTE-BASED ENCRYPTION WITH MAPREDUCE 191 JINGWEI LI, CHUNFU JIA, JIN LI, AND XIAOFENG CHEN SECURITY ENHANCEMENT OF IDENTITY-BASED IDENTIFICATION WITH REVERSIBILITY 202 ATSUSHI FUJIOKA, TAIICHI SAITO, AND KEITA XAGAWA S E C U R I T Y I N M O B I L E S Y S T E M S COOPETITIVE ARCHITECTURE TO SUPPORT A DYNAMIC AND SCALABLE N F C BASED MOBILE SERVICES ARCHITECTURE 214 RAJA NAEEM AKRAM, KONSTANTINOS MARKANTONAKIS, AND KEITH MAYES IMAGE 3 T A B L E OF C O N T E N T S X I I I PERMISSION-BASED ABNORMAL APPLICATION DETECTION FOR ANDROID 228 JIAWEI ZHU, ZHI GUAN, YANG YANG, LIANGWEN YU, HUIPING SUN, AND ZHONG CHEN SYMBIAN SMARTPHONE FORENSICS AND SECURITY: RECOVERY OF PRIVACY-PROTECTED DELETED D A T A 240 VRIZLYNN L.L. THING AND DARELL J.J. TAN S O F T W A R E S E C U R I T Y DETECTING ENCRYPTION FUNCTIONS VIA PROCESS EMULATION AND IL-BASED PROGRAM ANALYSIS 252 RUOXU ZHAO, DAWU GXI, JUANRU LI, AND HUI LIU TAINT ANALYSIS OF SECURITY CODE IN THE KLEE SYMBOLIC EXECUTION ENGINE 264 RICARDO CORIN AND FELIPE ANDRES MANZANO S H O R T P A P E R S A U T H E N T I C A T I O N A GENERIC APPROACH FOR PROVIDING REVOCATION SUPPORT IN SECRET HANDSHAKE 276 YANJIANG YANG, HAIBING LU, JIAN WENG, XUHUA DING, AND JIANYING ZHOU AN EFFICIENT SINGLE-SLOW-PHASE MUTUALLY AUTHENTICATED RFID DISTANCE BOUNDING PROTOCOL WITH TAG PRIVACY 285 ANJIA YANG, YUNHUI ZHUANG, AND DUNCAN S. WONG EXPLORING MOBILE PROXIES FOR BETTER PASSWORD AUTHENTICATION 293 NITESH SAXENA AND JONATHAN VORIS ON SECURITY OF UNIVERSAL HASH FUNCTION BASED MULTIPLE AUTHENTICATION 303 AYSAJAN ABIDIN C R Y P T A N A L Y S I S A NEW VARIANT OF TIME MEMORY TRADE-OFF ON THE IMPROVEMENT OF THING AND YING S ATTACK 311 ZHENQI LI, YAO LU, WENHAO WANG, B I N ZHANG, AND DONGDAI L I N APPLYING TIME-MEMORY-DATA TRADE-OFF T O PLAINTEXT RECOVERY ATTACK 321 ZHENQI LI, BIN ZHANG, YAO LU, JING ZOU, AND DONGDAI L I N IMAGE 4 X I V TABLE OF CONTENTS COMPARISON BETWEEN SIDE-CHANNEL ANALYSIS DISTINGUISHES 331 HOUSSERN MAGHREBI, OLIVIER RIOUL, SYLVAIN GUILLEY, AND JEAN-LUC DANGER M U L T I M E D I A S E C U R I T Y A N D G P U - E N A B L E D C O M P U T A T I O N ACCELERATION OF COMPOSITE ORDER BILINEAR PAIRING ON GRAPHICS HARDWARE 341 YE ZHANG, CHUN JASON XUE, DUNCAN S. WONG, NIKOS MAMOULIS, AND SIU MING YIU EVALUATING THE EFFECT OF TOLERANCE ON CLICK-DRAW BASED GRAPHICAL PASSWORD SCHEME 349 YUXIN MENG AND WENJUAN L I ROBUST EVIDENCE DETECTION OF COPY-ROTATE-MOVE FORGERY IN IMAGE BASED ON SINGULAR VALUE DECOMPOSITION 357 LIU YONG, HUANG MEISHAN, AND LIN BOGANG N E T W O R K S E C U R I T Y COOKIE-PROXY: A SCHEME T O PREVENT SSLSTRIP ATTACK 365 SENDONG ZHAO, DING WANG, SICHENG ZHAO, WU YANG, AND CHUNGUANG M A DETECTING AND PREVENTING ACTIVEX API-MISUSE VULNERABILITIES IN INTERNET EXPLORER 373 TING DAI, SAI SATHYANARAYAN, ROLAND H. C. YAP, AND ZHENKAI LIANG ENDPOINT MITIGATION OF DDOS ATTACKS BASED ON DYNAMIC THRESHOLDING 381 DAEWON KIM, BYOUNGKOO KIM, IKKYUN KIM, JEONGNYEO KIM, AND HYUNSOOK CHO PARAMETER POLLUTION VULNERABILITIES DETECTION STUDY BASED ON TREE EDIT DISTANCE 392 YAN CAO, QIANG WEI, AND QINGXIAN WANG P R I V A C Y A PRIVACY-PRESERVING PATH-CHECKING SOLUTION FOR RFID-BASED SUPPLY CHAINS 400 WEI XIN, HUIPING SUN, TAO YANG, ZHI GUAN, AND, ZHONG CHEN EFFICIENT ATTRIBUTE PROOFS IN ANONYMOUS CREDENTIAL USING ATTRIBUTE-BASED CRYPTOGRAPHY 408 YAN ZHANG AND DENGGUO FENG IMAGE 5 TABLE OF CONTENTS XV F 5 P : KEYWORD SEARCH OVER ENCRYPTED D A T A WITH FIVE FUNCTIONS AND FIVE PRIVACY ASSURANCES 416 HUIMIN SHUAI AND WEN TAO ZHU LOCATION PRIVACY POLICY MANAGEMENT SYSTEM 427 AREJ MUHAMMED, DAN LIN. AND A N N A SQUICCIANNI PRIVACY PROTECTION IN SOCIAL NETWORKS USING /-DIVERSITY 43-5 LIANGWEN YU, .JIAWEI ZHU, ZHENGANG WU, TAO YANG, JIANBIN HU, AND ZHONG CHEN SELLING POWER BACK TO THE GRID IN A SECURE AND PRIVACY-PRESERVING MANNER 445 TAT WING CHIRN, SVU MING YIU, LUCAS CHI KWONG HUI, VICTOR ON KWOK LI, TIN WING MUI, YU HIN TSANG, CHUN K I N KWOK, AND, KWUN YIN YU P R O T O C O L S A KEY SHARING FUZZY VAULT SCHEME 453 LIN YOU, MENGSHENG FAN, JIE LU, SHENGGUO WANG, AND FENGHAI L I A NEW VERSION OF MCELIECE P K C BASED ON CONVOLUTIONAL CODES 461 CARL LONDAHL AND THOMAS JOHANSSON FLEXIBLE ATTRIBUTE-BASED ENCRYPTION 471 SEIKO ARITA NON-INTERACTIVE DYNAMIC IDENTITY-BASED BROADCAST ENCRYPTION WITHOUT RANDOM ORACLES 479 YANLI REN, SHUOZHONG WANG, AND XINPENG ZHANG S O F T W A R E S E C U R I T Y A COMPARATIVE STUDY OF MALWARE FAMILY CLASSIFICATION 488 RAFIQUL ISLAM, AND IRFAN ALTAS A FINE-GRAINED CLASSIFICATION APPROACH FOR THE PACKED MALICIOUS CODE 497 SHANQING GUO, SHUANGSHUANG LI. YAN YU, ANLEI HU, AND, TAO B A N A U T H O R I N D E X 505
any_adam_object 1
author_GND (DE-588)1027271278
building Verbundindex
bvnumber BV040508630
classification_rvk SS 4800
classification_tum DAT 465f
DAT 461f
ctrlnum (OCoLC)816345319
(DE-599)DNB1025944763
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02941nam a2200661 cb4500</leader><controlfield tag="001">BV040508630</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121214 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121029s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1025944763</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642341284</subfield><subfield code="9">3-642-34128-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642341281</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-34128-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642341281</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86163584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)816345319</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1025944763</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings</subfield><subfield code="c">Tat Wing Chim ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 506 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7618</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Hongkong</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chim, Tat Wing</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1027271278</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">14</subfield><subfield code="d">2012</subfield><subfield code="c">Hongkong</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1027271340</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-34129-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7618</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7618</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4121753&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=025355215&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025355215</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2012 Hongkong gnd-content
genre_facet Konferenzschrift 2012 Hongkong
id DE-604.BV040508630
illustrated Illustrated
indexdate 2024-12-24T02:51:57Z
institution BVB
institution_GND (DE-588)1027271340
isbn 3642341284
9783642341281
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-025355215
oclc_num 816345319
open_access_boolean
owner DE-706
DE-83
DE-11
DE-91G
DE-BY-TUM
owner_facet DE-706
DE-83
DE-11
DE-91G
DE-BY-TUM
physical XV, 506 S. graph. Darst.
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings
Lecture notes in computer science
Kryptosystem (DE-588)4209132-9 gnd
Rechnernetz (DE-588)4070085-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptologie (DE-588)4033329-2 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4209132-9
(DE-588)4070085-9
(DE-588)4011144-1
(DE-588)4709127-7
(DE-588)4830502-9
(DE-588)4033329-2
(DE-588)4274324-2
(DE-588)1071861417
title Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings
title_auth Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings
title_exact_search Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings
title_full Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Tat Wing Chim ... (eds.)
title_fullStr Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Tat Wing Chim ... (eds.)
title_full_unstemmed Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Tat Wing Chim ... (eds.)
title_short Information and communications security
title_sort information and communications security 14th international conference icics 2012 hong kong china october 29 31 2012 proceedings
title_sub 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings
topic Kryptosystem (DE-588)4209132-9 gnd
Rechnernetz (DE-588)4070085-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptologie (DE-588)4033329-2 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Kryptosystem
Rechnernetz
Datensicherung
Sicherheitsprotokoll
Kryptoanalyse
Kryptologie
Computersicherheit
Konferenzschrift 2012 Hongkong
url http://deposit.dnb.de/cgi-bin/dokserv?id=4121753&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025355215&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT chimtatwing informationandcommunicationssecurity14thinternationalconferenceicics2012hongkongchinaoctober29312012proceedings
AT icicshongkong informationandcommunicationssecurity14thinternationalconferenceicics2012hongkongchinaoctober29312012proceedings