Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7671 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040604206 | ||
003 | DE-604 | ||
005 | 20130725 | ||
007 | t| | ||
008 | 121203s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N44 |2 dnb | ||
016 | 7 | |a 1027239021 |2 DE-101 | |
020 | |a 3642351298 |9 3-642-35129-8 | ||
020 | |a 9783642351297 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-35129-7 | ||
024 | 3 | |a 9783642351297 | |
028 | 5 | 2 | |a Best.-Nr.: 86189188 |
035 | |a (OCoLC)823231587 | ||
035 | |a (DE-599)DNB1027239021 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 259f |2 stub | ||
245 | 1 | 0 | |a Information systems security |b 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings |c Venkat Venkatakrishnan ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XV, 351 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7671 | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Gauhati |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 1 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | 2 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 2 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 2 | 2 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a Venkatakrishnan, Venkat |e Sonstige |0 (DE-588)1028510535 |4 oth | |
711 | 2 | |a ICISS |n 8 |d 2012 |c Gauhati |j Sonstige |0 (DE-588)1028510624 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-35130-3 |
830 | 0 | |a Lecture notes in computer science |v 7671 |w (DE-604)BV000000607 |9 7671 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4168059&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431901&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025431901 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999 |
---|---|
DE-BY-TUM_katkey | 1905400 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040071428832 |
_version_ | 1820852546386788352 |
adam_text | IMAGE 1
TABLE O F C O N T E N T S
INVITED T A L K I
FIGHTING MALICIOUS SOFTWARE 1
CHRISTOPHER KRUEGEL
T E C H N I C A L SESSION I: SOFTWARE S E C U R I T Y
VULNERABLEME: MEASURING SYSTEMIC WEAKNESSES IN MOBILE BROWSER SECURITY
16
CHAITRALI AMRUTKAR, KAPIL SINGH, ARUNABH VERMA, AND PATRICK TRAYNOR
SECURITY ASSESSMENT OF NODE.JS PLATFORM 3-5
ANDRES OJAMAA AND KARL DIIUNA
I N V I T E D T A L K I I
FOUNDATIONS OF DYNAMIC ACCESS CONTROL 44
PRASAD NALDURG
T E C H N I C A L SESSION II: ACCESS C O N T R O L
RISK-AWARE RBAC SESSIONS 59
KHALID ZAMAN BIJON. RAM KRISHNAN, AND RAVI SANDHU
A COGNITIVE TRUST MODEL FOR ACCESS CONTROL FRAMEWORK IN MANET . . . . 75
SOUMYA MAITY AND SOUMYA K. GHOSH
T R U S T - O R B A C : A TRUST ACCESS CONTROL MODEL IN
MULTI-ORGANIZATION ENVIRONMENTS 89
KHALIFA TOUMI, CESAR ANDRES, AND A N A CAVALLI
I N V I T E D T A L K I I I
ON POLICIES AND INTENTS 104
MATTHEW L. BOLTON, CELESTE M. WALLACE, AND LENORE D. ZUCK
HTTP://D-NB.INFO/1027239021
IMAGE 2
XIV TABLE OF CONTENTS
T E C H N I C A L SESSION I I I : C O V E R T C O M M U N I C A T I O N
S
PROTOLEAKS: A RELIABLE AND PROTOCOL-INDEPENDENT NETWORK COVERT CHANNEL
119
ARNE SWINNEN, RAOUL STRACKX, PIETER PHILIPPAERTS, AND FRANK PIESSENS
KEYLESS STEGANOGRAPHY IN SPATIAL DOMAIN USING ENERGETIC PIXELS 134
GOUTAM PAUL, IAN DAVIDSON, IMON MUKHERJEE, AND S.S. RAVI
FUZZY INFERENCE RULE BASED REVERSIBLE WATERMARKING FOR DIGITAL IMAGES
149
RUCHIRA NASKAR AND RAJAT SUBHRA CHAKRABOHY
T E C H N I C A L SESSION I V : N E T W O R K S E C U R I T Y I
SECURE TRUST METADATA MANAGEMENT FOR MOBILE AD-HOC NETWORKS 164 VIVEK
NATARAJAN, YI YANG, AND SENCUN ZHU
DEFENCE AGAINST WORMHOLE ATTACKS IN WIRELESS MESH NETWORKS 181
RAKESH MATAM AND SOMANATH TRIPATHY
A NOVEL KEY UPDATE PROTOCOL IN MOBILE SENSOR NETWORKS 194
SARITA AGRAWAL, RODRIGO ROMAN, MANIK LAI DAS, ANISH MATHURIA, AND JAVIER
LOPEZ
AUTONOMOUS CERTIFICATION WITH LIST-BASED REVOCATION FOR SECURE V2V
COMMUNICATION 208
ANUP K U M A R BHATTACHARYA, ABHIJIT DAS, DIPANWITA ROYCHOUDHURY,
ARAVIND IYER, AND DEBOJYOTI BHATTACHARYA
T E C H N I C A L SESSION V : D A T A B A S E A N D D I S T R I B U T E
D S Y S T E M S S E C U R I T Y
MITIGATING INSIDER THREAT ON DATABASE INTEGRITY 223
WEIHAN LI, BRAJENDRA PANDA, AND QUSSAI YASEEN
COERCION RESISTANT MIX FOR ELECTRONIC AUCTION 238
JAYDEEP HOWLADER, JAYANTA KAR, AND ASHIS K U M A R MAI
VERIFICATION OF MONEY ATOMICITY IN DIGITAL CASH BASED PAYMENT SYSTEM 249
GIRISH CHANDRA AND DIVAKAR YADAV
T E C H N I C A L SESSION V I : N E T W O R K S E C U R I T Y I I
CRYPTOGRAPHIC ANALYSIS OF A TYPE OF SEQUENCE GENERATORS ALBERTO PEINADO
AND AMPARO FUSTER-SABATER 265
IMAGE 3
TABLE OF CONTENTS XV
CERTIFICATE-LESS ON-DEMAND PUBLIC KEY MANAGEMENT (CLPKM) FOR
SELF-ORGANIZED MANETS 277
SOUMYADEV MAITY AND, R.C. HANSDAH
COMPUTATIONALLY EFFICIENT SECURE ACCESS CONTROL FOR VEHICULAR AD HOC
NETWORKS 294
Y. SREENIVASA RAO AND RATNA DUTTA
T E C H N I C A L SESSION V I I
TRACKING INSECURE INFORMATION FLOWS: A PROTOTYPE EVALUATOR IN A S F + S
D F 310
DOAA HASSAN
ATTACKING IMAGE BASED CAPTCHAS USING IMAGE RECOGNITION TECHNIQUES 327
DAVID LORENZI, JAIDEEP VAIDYA, EMRE UZUN, SHAMIK SURAL, AND
VIJAYALAKSHMI ATLURI
CORRECTNESS VERIFICATION IN DATABASE OUTSOURCING: A TRUST-BASED FAKE
TUPLES APPROACH 343
SIMIN GHASEMI, MORTEZA NOFERESTI, MOHAMMAD ALI HADAVI, SADEGH DORRI
NOGOORA.NI, AND RASOOL JALILI
A U T H O R I N D E X 353
|
any_adam_object | 1 |
author_GND | (DE-588)1028510535 |
building | Verbundindex |
bvnumber | BV040604206 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f DAT 050f DAT 461f DAT 259f |
ctrlnum | (OCoLC)823231587 (DE-599)DNB1027239021 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03503nam a2200781 cb4500</leader><controlfield tag="001">BV040604206</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130725 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121203s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N44</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1027239021</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642351298</subfield><subfield code="9">3-642-35129-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642351297</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-35129-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642351297</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86189188</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)823231587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1027239021</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 259f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings</subfield><subfield code="c">Venkat Venkatakrishnan ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 351 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7671</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Gauhati</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Venkatakrishnan, Venkat</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1028510535</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICISS</subfield><subfield code="n">8</subfield><subfield code="d">2012</subfield><subfield code="c">Gauhati</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1028510624</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-35130-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7671</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7671</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4168059&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431901&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025431901</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Gauhati gnd-content |
genre_facet | Konferenzschrift 2012 Gauhati |
id | DE-604.BV040604206 |
illustrated | Illustrated |
indexdate | 2024-12-24T02:54:48Z |
institution | BVB |
institution_GND | (DE-588)1028510624 |
isbn | 3642351298 9783642351297 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025431901 |
oclc_num | 823231587 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM |
physical | XV, 351 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Lecture notes in computer science Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Authentifikation (DE-588)4330656-1 gnd Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Privatsphäre (DE-588)4123980-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4330656-1 (DE-588)4011144-1 (DE-588)4072806-7 (DE-588)4625230-7 (DE-588)4123980-5 (DE-588)4274324-2 (DE-588)1071861417 |
title | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings |
title_auth | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings |
title_exact_search | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings |
title_full | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Venkat Venkatakrishnan ... (eds.) |
title_fullStr | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Venkat Venkatakrishnan ... (eds.) |
title_full_unstemmed | Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Venkat Venkatakrishnan ... (eds.) |
title_short | Information systems security |
title_sort | information systems security 8th international conference iciss 2012 guwahati india december 15 19 2012 proceedings |
title_sub | 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings |
topic | Zugriffskontrolle (DE-588)4293034-0 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Authentifikation (DE-588)4330656-1 gnd Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Privatsphäre (DE-588)4123980-5 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Zugriffskontrolle Rechnernetz Kryptoanalyse Authentifikation Datensicherung Informationssystem Schlüsselverwaltung Privatsphäre Computersicherheit Konferenzschrift 2012 Gauhati |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4168059&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431901&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT venkatakrishnanvenkat informationsystemssecurity8thinternationalconferenceiciss2012guwahatiindiadecember15192012proceedings AT icissgauhati informationsystemssecurity8thinternationalconferenceiciss2012guwahatiindiadecember15192012proceedings |