Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7618 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040508630 | ||
003 | DE-604 | ||
005 | 20121214 | ||
007 | t| | ||
008 | 121029s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N38 |2 dnb | ||
016 | 7 | |a 1025944763 |2 DE-101 | |
020 | |a 3642341284 |9 3-642-34128-4 | ||
020 | |a 9783642341281 |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.) |9 978-3-642-34128-1 | ||
024 | 3 | |a 9783642341281 | |
028 | 5 | 2 | |a Best.-Nr.: 86163584 |
035 | |a (OCoLC)816345319 | ||
035 | |a (DE-599)DNB1025944763 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Information and communications security |b 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings |c Tat Wing Chim ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XV, 506 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7618 | |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Hongkong |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 4 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Chim, Tat Wing |e Sonstige |0 (DE-588)1027271278 |4 oth | |
711 | 2 | |a ICICS |n 14 |d 2012 |c Hongkong |j Sonstige |0 (DE-588)1027271340 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-34129-8 |
830 | 0 | |a Lecture notes in computer science |v 7618 |w (DE-604)BV000000607 |9 7618 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4121753&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025355215&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025355215 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999 |
---|---|
DE-BY-TUM_katkey | 1903068 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040071428025 |
_version_ | 1820852535411343360 |
adam_text | IMAGE 1
TABLE O F C O N T E N T S
PULL P A P E R S
A P P L I E D C R Y P T O G R A P H Y
AUDIO STEGANALYSIS BASED ON LOSSLESS DATA-COMPRESSION TECHNIQUES . . . .
1 FATIHA DJEBBAR AND BEGHDAD A Y AD
ENHANCING THE PERCEIVED VISUAL QUALITY OF A SIZE INVARIANT VISUAL
CRYPTOGRAPHY SCHEME 10
YANG-WAI CHOW. WILLY SUSILO. AND DUNCAN S. WONG
IMPACT OF THE REVOCATION SERVICE IN P K I PRICES 22
CARLOS GANDN. JOSE L. MUNOZ, OSCAR ESPARZA, JORGE MATA-DIAZ, AND JUANJO
ALIUS
C R Y P T A N A L Y S I S
CRYPTANALYSIS OF MULTI-PRIME RSA WITH SMALL PRIME DIFFERENCE 33
HATEM M. BAHIG, ASHRAF BHERY, AND DIEAA I. NASSR
IMPLICIT POLYNOMIAL RECOVERY AND CRYPTANALYSIS OF A COMBINATORIAL KEY
CRYPTOSYSTEM 45
JUN XU, LEI HU, AND SIWEI S U N
IMPROVED RELATED-KEY DIFFERENTIAL ATTACKS ON REDUCED-ROUND LBLOCK 58
SHUSHENG LIU, ZHENG GONG, AND LIBIN WANG
N E T W O R K S E C U R I T Y
COUNTERMEASURES ON APPLICATION LEVEL LOW-RATE DENIAL-OF-SERVICE ATTACK
70
YAJUAN TANG
FIREWALL PACKET FILTERING OPTIMIZATION USING STATISTICAL TRAFFIC
AWARENESS TEST 81
ZOUHEIR TRABELSI, LIREN ZHANG, AND SAFAA ZEIDAN
GROUP BEHAVIOR METRICS FOR P 2 P BOTNET DETECTION 93
JOHN FELIX. CHARLES JOSEPH, AND AH A. GHORBANI
HTTP://D-NB.INFO/1025944763
IMAGE 2
XII
TABLE OF CONTENTS
O P T I M I Z A T I O N
HARDWARE PERFORMANCE OPTIMIZATION AND EVALUATION OF SM3 HASH ALGORITHM
ON F P G A 105
YUAN MA, LUNING XIA, JINGQIANG LIN, JIWU JING, ZONGBIN LIU, AND XINGJIE
YU
P R I V A C Y
CONTINUAL LEAKAGE-RESILIENT DYNAMIC SECRET SHARING IN THE SPLIT-STATE
MODEL 119
HAO XIONG, CONG ZHANG, TSZ HON YUEN, ECHO P. ZHANG, SIU MING YIU, AND
SIHAN QING
CONVERSION OF REAL-NUMBERED PRIVACY-PRESERVING PROBLEMS INTO THE INTEGER
DOMAIN 131
WILKO HENECKA, NIGEL BEAN, AND MATTHEW ROUGHAN
PERFECT AMBIGUOUS OPTIMISTIC FAIR EXCHANGE 142
YANG WANG, MAN HO AU, AND WILLY SUSILO
PRIVACY-PRESERVING NOISY KEYWORD SEARCH IN CLOUD COMPUTING 154 XIAOQIONG
PANG, BO YANG, AND QIONG HUANG
P R O T O C O L S
FORWARD SECURE ATTRIBUTE-BASED SIGNATURES 167
TSZ HON YUEN, JOSEPH K. LIU, XINYI HUANG, MAN HO A U , WILLY SUSILO, AND
JIANYING ZHOU
ON CONSTANT-ROUND PRECISE ZERO-KNOWLEDGE 178
NING DING AND DAWU GU
OUTSOURCING ENCRYPTION OF ATTRIBUTE-BASED ENCRYPTION WITH MAPREDUCE 191
JINGWEI LI, CHUNFU JIA, JIN LI, AND XIAOFENG CHEN
SECURITY ENHANCEMENT OF IDENTITY-BASED IDENTIFICATION WITH REVERSIBILITY
202
ATSUSHI FUJIOKA, TAIICHI SAITO, AND KEITA XAGAWA
S E C U R I T Y I N M O B I L E S Y S T E M S
COOPETITIVE ARCHITECTURE TO SUPPORT A DYNAMIC AND SCALABLE N F C BASED
MOBILE SERVICES ARCHITECTURE 214
RAJA NAEEM AKRAM, KONSTANTINOS MARKANTONAKIS, AND KEITH MAYES
IMAGE 3
T A B L E OF C O N T E N T S X I I I
PERMISSION-BASED ABNORMAL APPLICATION DETECTION FOR ANDROID 228 JIAWEI
ZHU, ZHI GUAN, YANG YANG, LIANGWEN YU, HUIPING SUN, AND ZHONG CHEN
SYMBIAN SMARTPHONE FORENSICS AND SECURITY: RECOVERY OF PRIVACY-PROTECTED
DELETED D A T A 240
VRIZLYNN L.L. THING AND DARELL J.J. TAN
S O F T W A R E S E C U R I T Y
DETECTING ENCRYPTION FUNCTIONS VIA PROCESS EMULATION AND IL-BASED
PROGRAM ANALYSIS 252
RUOXU ZHAO, DAWU GXI, JUANRU LI, AND HUI LIU
TAINT ANALYSIS OF SECURITY CODE IN THE KLEE SYMBOLIC EXECUTION ENGINE
264
RICARDO CORIN AND FELIPE ANDRES MANZANO
S H O R T P A P E R S
A U T H E N T I C A T I O N
A GENERIC APPROACH FOR PROVIDING REVOCATION SUPPORT IN SECRET HANDSHAKE
276
YANJIANG YANG, HAIBING LU, JIAN WENG, XUHUA DING, AND JIANYING ZHOU
AN EFFICIENT SINGLE-SLOW-PHASE MUTUALLY AUTHENTICATED RFID DISTANCE
BOUNDING PROTOCOL WITH TAG PRIVACY 285
ANJIA YANG, YUNHUI ZHUANG, AND DUNCAN S. WONG
EXPLORING MOBILE PROXIES FOR BETTER PASSWORD AUTHENTICATION 293
NITESH SAXENA AND JONATHAN VORIS
ON SECURITY OF UNIVERSAL HASH FUNCTION BASED MULTIPLE AUTHENTICATION 303
AYSAJAN ABIDIN
C R Y P T A N A L Y S I S
A NEW VARIANT OF TIME MEMORY TRADE-OFF ON THE IMPROVEMENT OF THING AND
YING S ATTACK 311
ZHENQI LI, YAO LU, WENHAO WANG, B I N ZHANG, AND DONGDAI L I N
APPLYING TIME-MEMORY-DATA TRADE-OFF T O PLAINTEXT RECOVERY ATTACK 321
ZHENQI LI, BIN ZHANG, YAO LU, JING ZOU, AND DONGDAI L I N
IMAGE 4
X I V
TABLE OF CONTENTS
COMPARISON BETWEEN SIDE-CHANNEL ANALYSIS DISTINGUISHES 331
HOUSSERN MAGHREBI, OLIVIER RIOUL, SYLVAIN GUILLEY, AND JEAN-LUC DANGER
M U L T I M E D I A S E C U R I T Y A N D G P U - E N A B L E D C O M P
U T A T I O N
ACCELERATION OF COMPOSITE ORDER BILINEAR PAIRING ON GRAPHICS HARDWARE
341
YE ZHANG, CHUN JASON XUE, DUNCAN S. WONG, NIKOS MAMOULIS, AND SIU MING
YIU
EVALUATING THE EFFECT OF TOLERANCE ON CLICK-DRAW BASED GRAPHICAL
PASSWORD SCHEME 349
YUXIN MENG AND WENJUAN L I
ROBUST EVIDENCE DETECTION OF COPY-ROTATE-MOVE FORGERY IN IMAGE BASED ON
SINGULAR VALUE DECOMPOSITION 357
LIU YONG, HUANG MEISHAN, AND LIN BOGANG
N E T W O R K S E C U R I T Y
COOKIE-PROXY: A SCHEME T O PREVENT SSLSTRIP ATTACK 365
SENDONG ZHAO, DING WANG, SICHENG ZHAO, WU YANG, AND CHUNGUANG M A
DETECTING AND PREVENTING ACTIVEX API-MISUSE VULNERABILITIES IN INTERNET
EXPLORER 373
TING DAI, SAI SATHYANARAYAN, ROLAND H. C. YAP, AND ZHENKAI LIANG
ENDPOINT MITIGATION OF DDOS ATTACKS BASED ON DYNAMIC THRESHOLDING 381
DAEWON KIM, BYOUNGKOO KIM, IKKYUN KIM, JEONGNYEO KIM, AND HYUNSOOK CHO
PARAMETER POLLUTION VULNERABILITIES DETECTION STUDY BASED ON TREE EDIT
DISTANCE 392
YAN CAO, QIANG WEI, AND QINGXIAN WANG
P R I V A C Y
A PRIVACY-PRESERVING PATH-CHECKING SOLUTION FOR RFID-BASED SUPPLY CHAINS
400
WEI XIN, HUIPING SUN, TAO YANG, ZHI GUAN, AND, ZHONG CHEN
EFFICIENT ATTRIBUTE PROOFS IN ANONYMOUS CREDENTIAL USING ATTRIBUTE-BASED
CRYPTOGRAPHY 408
YAN ZHANG AND DENGGUO FENG
IMAGE 5
TABLE OF CONTENTS XV
F 5 P : KEYWORD SEARCH OVER ENCRYPTED D A T A WITH FIVE FUNCTIONS AND
FIVE PRIVACY ASSURANCES 416
HUIMIN SHUAI AND WEN TAO ZHU
LOCATION PRIVACY POLICY MANAGEMENT SYSTEM 427
AREJ MUHAMMED, DAN LIN. AND A N N A SQUICCIANNI
PRIVACY PROTECTION IN SOCIAL NETWORKS USING /-DIVERSITY 43-5
LIANGWEN YU, .JIAWEI ZHU, ZHENGANG WU, TAO YANG, JIANBIN HU, AND ZHONG
CHEN
SELLING POWER BACK TO THE GRID IN A SECURE AND PRIVACY-PRESERVING MANNER
445
TAT WING CHIRN, SVU MING YIU, LUCAS CHI KWONG HUI, VICTOR ON KWOK LI,
TIN WING MUI, YU HIN TSANG,
CHUN K I N KWOK, AND, KWUN YIN YU
P R O T O C O L S
A KEY SHARING FUZZY VAULT SCHEME 453
LIN YOU, MENGSHENG FAN, JIE LU, SHENGGUO WANG, AND FENGHAI L I
A NEW VERSION OF MCELIECE P K C BASED ON CONVOLUTIONAL CODES 461
CARL LONDAHL AND THOMAS JOHANSSON
FLEXIBLE ATTRIBUTE-BASED ENCRYPTION 471
SEIKO ARITA
NON-INTERACTIVE DYNAMIC IDENTITY-BASED BROADCAST ENCRYPTION WITHOUT
RANDOM ORACLES 479
YANLI REN, SHUOZHONG WANG, AND XINPENG ZHANG
S O F T W A R E S E C U R I T Y
A COMPARATIVE STUDY OF MALWARE FAMILY CLASSIFICATION 488
RAFIQUL ISLAM, AND IRFAN ALTAS
A FINE-GRAINED CLASSIFICATION APPROACH FOR THE PACKED MALICIOUS CODE 497
SHANQING GUO, SHUANGSHUANG LI. YAN YU, ANLEI HU, AND, TAO B A N
A U T H O R I N D E X 505
|
any_adam_object | 1 |
author_GND | (DE-588)1027271278 |
building | Verbundindex |
bvnumber | BV040508630 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 461f |
ctrlnum | (OCoLC)816345319 (DE-599)DNB1025944763 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02941nam a2200661 cb4500</leader><controlfield tag="001">BV040508630</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121214 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121029s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1025944763</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642341284</subfield><subfield code="9">3-642-34128-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642341281</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-34128-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642341281</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86163584</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)816345319</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1025944763</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings</subfield><subfield code="c">Tat Wing Chim ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 506 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7618</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Hongkong</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chim, Tat Wing</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1027271278</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">14</subfield><subfield code="d">2012</subfield><subfield code="c">Hongkong</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1027271340</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-34129-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7618</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7618</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4121753&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025355215&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025355215</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Hongkong gnd-content |
genre_facet | Konferenzschrift 2012 Hongkong |
id | DE-604.BV040508630 |
illustrated | Illustrated |
indexdate | 2024-12-24T02:51:57Z |
institution | BVB |
institution_GND | (DE-588)1027271340 |
isbn | 3642341284 9783642341281 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025355215 |
oclc_num | 816345319 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | XV, 506 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Lecture notes in computer science Kryptosystem (DE-588)4209132-9 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4070085-9 (DE-588)4011144-1 (DE-588)4709127-7 (DE-588)4830502-9 (DE-588)4033329-2 (DE-588)4274324-2 (DE-588)1071861417 |
title | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings |
title_auth | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings |
title_exact_search | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings |
title_full | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Tat Wing Chim ... (eds.) |
title_fullStr | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Tat Wing Chim ... (eds.) |
title_full_unstemmed | Information and communications security 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings Tat Wing Chim ... (eds.) |
title_short | Information and communications security |
title_sort | information and communications security 14th international conference icics 2012 hong kong china october 29 31 2012 proceedings |
title_sub | 14th international conference, ICICS 2012, Hong Kong, China, October 29 - 31, 2012 ; proceedings |
topic | Kryptosystem (DE-588)4209132-9 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Kryptosystem Rechnernetz Datensicherung Sicherheitsprotokoll Kryptoanalyse Kryptologie Computersicherheit Konferenzschrift 2012 Hongkong |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4121753&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025355215&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT chimtatwing informationandcommunicationssecurity14thinternationalconferenceicics2012hongkongchinaoctober29312012proceedings AT icicshongkong informationandcommunicationssecurity14thinternationalconferenceicics2012hongkongchinaoctober29312012proceedings |