Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2012
Schriftenreihe:Lecture notes in computer science 7671
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV040604206
003 DE-604
005 20130725
007 t|
008 121203s2012 gw d||| |||| 10||| eng d
015 |a 12,N44  |2 dnb 
016 7 |a 1027239021  |2 DE-101 
020 |a 3642351298  |9 3-642-35129-8 
020 |a 9783642351297  |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)  |9 978-3-642-35129-7 
024 3 |a 9783642351297 
028 5 2 |a Best.-Nr.: 86189188 
035 |a (OCoLC)823231587 
035 |a (DE-599)DNB1027239021 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-706  |a DE-83  |a DE-91G 
082 0 |a 005.8  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
084 |a DAT 465f  |2 stub 
084 |a DAT 050f  |2 stub 
084 |a DAT 461f  |2 stub 
084 |a DAT 259f  |2 stub 
245 1 0 |a Information systems security  |b 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings  |c Venkat Venkatakrishnan ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2012 
300 |a XV, 351 S.  |b graph. Darst.  |c 235 mm x 155 mm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7671 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Informationssystem  |0 (DE-588)4072806-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Schlüsselverwaltung  |0 (DE-588)4625230-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Privatsphäre  |0 (DE-588)4123980-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2012  |z Gauhati  |2 gnd-content 
689 0 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 0 1 |a Informationssystem  |0 (DE-588)4072806-7  |D s 
689 0 2 |a Privatsphäre  |0 (DE-588)4123980-5  |D s 
689 0 3 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 4 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 1 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 1 2 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 |5 DE-604 
689 2 0 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 2 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 2 2 |a Schlüsselverwaltung  |0 (DE-588)4625230-7  |D s 
689 2 |8 1\p  |5 DE-604 
700 1 |a Venkatakrishnan, Venkat  |e Sonstige  |0 (DE-588)1028510535  |4 oth 
711 2 |a ICISS  |n 8  |d 2012  |c Gauhati  |j Sonstige  |0 (DE-588)1028510624  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-35130-3 
830 0 |a Lecture notes in computer science  |v 7671  |w (DE-604)BV000000607  |9 7671 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=4168059&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431901&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-025431901 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1905400
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040071428832
_version_ 1820852546386788352
adam_text IMAGE 1 TABLE O F C O N T E N T S INVITED T A L K I FIGHTING MALICIOUS SOFTWARE 1 CHRISTOPHER KRUEGEL T E C H N I C A L SESSION I: SOFTWARE S E C U R I T Y VULNERABLEME: MEASURING SYSTEMIC WEAKNESSES IN MOBILE BROWSER SECURITY 16 CHAITRALI AMRUTKAR, KAPIL SINGH, ARUNABH VERMA, AND PATRICK TRAYNOR SECURITY ASSESSMENT OF NODE.JS PLATFORM 3-5 ANDRES OJAMAA AND KARL DIIUNA I N V I T E D T A L K I I FOUNDATIONS OF DYNAMIC ACCESS CONTROL 44 PRASAD NALDURG T E C H N I C A L SESSION II: ACCESS C O N T R O L RISK-AWARE RBAC SESSIONS 59 KHALID ZAMAN BIJON. RAM KRISHNAN, AND RAVI SANDHU A COGNITIVE TRUST MODEL FOR ACCESS CONTROL FRAMEWORK IN MANET . . . . 75 SOUMYA MAITY AND SOUMYA K. GHOSH T R U S T - O R B A C : A TRUST ACCESS CONTROL MODEL IN MULTI-ORGANIZATION ENVIRONMENTS 89 KHALIFA TOUMI, CESAR ANDRES, AND A N A CAVALLI I N V I T E D T A L K I I I ON POLICIES AND INTENTS 104 MATTHEW L. BOLTON, CELESTE M. WALLACE, AND LENORE D. ZUCK HTTP://D-NB.INFO/1027239021 IMAGE 2 XIV TABLE OF CONTENTS T E C H N I C A L SESSION I I I : C O V E R T C O M M U N I C A T I O N S PROTOLEAKS: A RELIABLE AND PROTOCOL-INDEPENDENT NETWORK COVERT CHANNEL 119 ARNE SWINNEN, RAOUL STRACKX, PIETER PHILIPPAERTS, AND FRANK PIESSENS KEYLESS STEGANOGRAPHY IN SPATIAL DOMAIN USING ENERGETIC PIXELS 134 GOUTAM PAUL, IAN DAVIDSON, IMON MUKHERJEE, AND S.S. RAVI FUZZY INFERENCE RULE BASED REVERSIBLE WATERMARKING FOR DIGITAL IMAGES 149 RUCHIRA NASKAR AND RAJAT SUBHRA CHAKRABOHY T E C H N I C A L SESSION I V : N E T W O R K S E C U R I T Y I SECURE TRUST METADATA MANAGEMENT FOR MOBILE AD-HOC NETWORKS 164 VIVEK NATARAJAN, YI YANG, AND SENCUN ZHU DEFENCE AGAINST WORMHOLE ATTACKS IN WIRELESS MESH NETWORKS 181 RAKESH MATAM AND SOMANATH TRIPATHY A NOVEL KEY UPDATE PROTOCOL IN MOBILE SENSOR NETWORKS 194 SARITA AGRAWAL, RODRIGO ROMAN, MANIK LAI DAS, ANISH MATHURIA, AND JAVIER LOPEZ AUTONOMOUS CERTIFICATION WITH LIST-BASED REVOCATION FOR SECURE V2V COMMUNICATION 208 ANUP K U M A R BHATTACHARYA, ABHIJIT DAS, DIPANWITA ROYCHOUDHURY, ARAVIND IYER, AND DEBOJYOTI BHATTACHARYA T E C H N I C A L SESSION V : D A T A B A S E A N D D I S T R I B U T E D S Y S T E M S S E C U R I T Y MITIGATING INSIDER THREAT ON DATABASE INTEGRITY 223 WEIHAN LI, BRAJENDRA PANDA, AND QUSSAI YASEEN COERCION RESISTANT MIX FOR ELECTRONIC AUCTION 238 JAYDEEP HOWLADER, JAYANTA KAR, AND ASHIS K U M A R MAI VERIFICATION OF MONEY ATOMICITY IN DIGITAL CASH BASED PAYMENT SYSTEM 249 GIRISH CHANDRA AND DIVAKAR YADAV T E C H N I C A L SESSION V I : N E T W O R K S E C U R I T Y I I CRYPTOGRAPHIC ANALYSIS OF A TYPE OF SEQUENCE GENERATORS ALBERTO PEINADO AND AMPARO FUSTER-SABATER 265 IMAGE 3 TABLE OF CONTENTS XV CERTIFICATE-LESS ON-DEMAND PUBLIC KEY MANAGEMENT (CLPKM) FOR SELF-ORGANIZED MANETS 277 SOUMYADEV MAITY AND, R.C. HANSDAH COMPUTATIONALLY EFFICIENT SECURE ACCESS CONTROL FOR VEHICULAR AD HOC NETWORKS 294 Y. SREENIVASA RAO AND RATNA DUTTA T E C H N I C A L SESSION V I I TRACKING INSECURE INFORMATION FLOWS: A PROTOTYPE EVALUATOR IN A S F + S D F 310 DOAA HASSAN ATTACKING IMAGE BASED CAPTCHAS USING IMAGE RECOGNITION TECHNIQUES 327 DAVID LORENZI, JAIDEEP VAIDYA, EMRE UZUN, SHAMIK SURAL, AND VIJAYALAKSHMI ATLURI CORRECTNESS VERIFICATION IN DATABASE OUTSOURCING: A TRUST-BASED FAKE TUPLES APPROACH 343 SIMIN GHASEMI, MORTEZA NOFERESTI, MOHAMMAD ALI HADAVI, SADEGH DORRI NOGOORA.NI, AND RASOOL JALILI A U T H O R I N D E X 353
any_adam_object 1
author_GND (DE-588)1028510535
building Verbundindex
bvnumber BV040604206
classification_rvk SS 4800
classification_tum DAT 465f
DAT 050f
DAT 461f
DAT 259f
ctrlnum (OCoLC)823231587
(DE-599)DNB1027239021
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03503nam a2200781 cb4500</leader><controlfield tag="001">BV040604206</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130725 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121203s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N44</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1027239021</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642351298</subfield><subfield code="9">3-642-35129-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642351297</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-35129-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642351297</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86189188</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)823231587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1027239021</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 259f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information systems security</subfield><subfield code="b">8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings</subfield><subfield code="c">Venkat Venkatakrishnan ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 351 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7671</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Gauhati</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Venkatakrishnan, Venkat</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1028510535</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICISS</subfield><subfield code="n">8</subfield><subfield code="d">2012</subfield><subfield code="c">Gauhati</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1028510624</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-35130-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7671</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7671</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4168059&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=025431901&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025431901</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2012 Gauhati gnd-content
genre_facet Konferenzschrift 2012 Gauhati
id DE-604.BV040604206
illustrated Illustrated
indexdate 2024-12-24T02:54:48Z
institution BVB
institution_GND (DE-588)1028510624
isbn 3642351298
9783642351297
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-025431901
oclc_num 823231587
open_access_boolean
owner DE-706
DE-83
DE-91G
DE-BY-TUM
owner_facet DE-706
DE-83
DE-91G
DE-BY-TUM
physical XV, 351 S. graph. Darst. 235 mm x 155 mm
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings
Lecture notes in computer science
Zugriffskontrolle (DE-588)4293034-0 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Datensicherung (DE-588)4011144-1 gnd
Informationssystem (DE-588)4072806-7 gnd
Schlüsselverwaltung (DE-588)4625230-7 gnd
Privatsphäre (DE-588)4123980-5 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4293034-0
(DE-588)4070085-9
(DE-588)4830502-9
(DE-588)4330656-1
(DE-588)4011144-1
(DE-588)4072806-7
(DE-588)4625230-7
(DE-588)4123980-5
(DE-588)4274324-2
(DE-588)1071861417
title Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings
title_auth Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings
title_exact_search Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings
title_full Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Venkat Venkatakrishnan ... (eds.)
title_fullStr Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Venkat Venkatakrishnan ... (eds.)
title_full_unstemmed Information systems security 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings Venkat Venkatakrishnan ... (eds.)
title_short Information systems security
title_sort information systems security 8th international conference iciss 2012 guwahati india december 15 19 2012 proceedings
title_sub 8th international conference, ICISS 2012, Guwahati, India, December 15 - 19, 2012 ; proceedings
topic Zugriffskontrolle (DE-588)4293034-0 gnd
Rechnernetz (DE-588)4070085-9 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Authentifikation (DE-588)4330656-1 gnd
Datensicherung (DE-588)4011144-1 gnd
Informationssystem (DE-588)4072806-7 gnd
Schlüsselverwaltung (DE-588)4625230-7 gnd
Privatsphäre (DE-588)4123980-5 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Zugriffskontrolle
Rechnernetz
Kryptoanalyse
Authentifikation
Datensicherung
Informationssystem
Schlüsselverwaltung
Privatsphäre
Computersicherheit
Konferenzschrift 2012 Gauhati
url http://deposit.dnb.de/cgi-bin/dokserv?id=4168059&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025431901&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT venkatakrishnanvenkat informationsystemssecurity8thinternationalconferenceiciss2012guwahatiindiadecember15192012proceedings
AT icissgauhati informationsystemssecurity8thinternationalconferenceiciss2012guwahatiindiadecember15192012proceedings