Security and privacy protection in information processing systems: 28th IFIP TC 11 international conference ; proceedings
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | Englisch |
Veröffentlicht: |
[Berlin ; Heidelberg]
Springer
2013
|
Schriftenreihe: | IFIP advances in information and communication technology
405 |
Schlagwörter: | |
Links: | http://deposit.dnb.de/cgi-bin/dokserv?id=4352613&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994038&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XIII, 436 S. graph. Darst. 24 cm |
ISBN: | 9783642392177 3642392172 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041548234 | ||
003 | DE-604 | ||
005 | 20220224 | ||
007 | t| | ||
008 | 140108s2013 gw d||| |||| 10||| eng d | ||
015 | |a 13,N23 |2 dnb | ||
015 | |a 13,A39 |2 dnb | ||
016 | 7 | |a 1035341506 |2 DE-101 | |
020 | |a 9783642392177 |c Pp. : ca. EUR 112.35 (DE) (freier Pr.), ca. EUR 115.50 (AT) (freier Pr.), ca. sfr 140.00 (freier Pr.) |9 978-3-642-39217-7 | ||
020 | |a 3642392172 |9 3-642-39217-2 | ||
024 | 3 | |a 9783642392177 | |
028 | 5 | 2 | |a Best.-Nr.: 86290062 |
035 | |a (OCoLC)859020215 | ||
035 | |a (DE-599)DNB1035341506 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-739 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Security and privacy protection in information processing systems |b 28th IFIP TC 11 international conference ; proceedings |c SEC 2013, Auckland, New Zealand, July 8 - 10, 2013. Lech J. Janczewski ... (eds.) |
264 | 1 | |a [Berlin ; Heidelberg] |b Springer |c 2013 | |
300 | |a XIII, 436 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a IFIP advances in information and communication technology |v 405 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobile Computing |0 (DE-588)4694120-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschutz |0 (DE-588)4131649-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 08.07.2013-10.07.2013 |z Auckland |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 5 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 6 | |a Mobile Computing |0 (DE-588)4694120-4 |D s |
689 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Janczewski, Lech |d 1943- |0 (DE-588)173435300 |4 edt | |
710 | 2 | |a International Federation for Information Processing |b Technical Committee Security and Privacy Protection in Information Processing Systems |e Sonstige |0 (DE-588)10360013-9 |4 oth | |
711 | 2 | |a SEC |n 28 |d 2013 |c Auckland |j Sonstige |0 (DE-588)1038799988 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Security and Privacy Protection in Information Processing Systems |
830 | 0 | |a IFIP advances in information and communication technology |v 405 |w (DE-604)BV036592990 |9 405 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4352613&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994038&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026994038 |
Datensatz im Suchindex
_version_ | 1819277497818152960 |
---|---|
adam_text | IMAGE 1
TABLE OF CONTENTS
MALWARE
EXPLORING TIMELINE-BASED MALWARE CLASSIFICATION 1
RAFIQUL ISLAM, IRFAN ALTAS, AND MD. SAIFUL ISLAM
SCREENING SMARTPHONE APPLICATIONS USING BEHAVIORAL SIGNATURES 14 SUYEON
LEE, JEHYUN LEE, AND HEEJO LEE
GAME THEORETIC APPROACH FOR COST-BENEFIT ANALYSIS OF MALWARE
PROLIFERATION PREVENTION 28
THEODOROS SPYRIDOPOULOS, GEORGE OIKONOMOU, THEO TRYFONAS, AND MENGMENG
GE
AUTHENTICATION AND AUTHORIZATION
EVOLVING A SECURE INTERNET 42
WILLIAM J. CAELLI, LAM-FOR KWOK, AND DENNIS LONGLEY
ENHANCING CLICK-DRAW BASED GRAPHICAL PASSWORDS USING MULTI-TOUCH ON
MOBILE PHONES 55
YUXIN MENG, WENJUAN LI, AND LAM-FOR KWOK
APPLYING DAC PRINCIPLES TO THE RDF GRAPH DATA MODEL 69
SABRINA KIRRANE, ALESSANDRA, MILEO, AND STEFAN DECKER
A LIGHTWEIGHT GAIT AUTHENTICATION ON MOBILE PHONE REGARDLESS OF
INSTALLATION ERROR 83
THANG HOANG, DEOKJAI CHOI, VIET VO, ANH NGUYEN, AND TH.UC NGUYEN
A VULNERABILITY IN THE SONG AUTHENTICATION PROTOCOL FOR LOW-COST RFID
TAGS 102
SARAH ABUGHAZALAH, KONSTANTINOS MARKANTONAKIS, AND KEITH MAYES
NETWORK SECURITY/ CRYPTOGRAPHY
EXTRACTION OF ABNF RULES FROM RFCS TO ENABLE AUTOMATED TEST DATA
GENERATION ILL
MARKUS GRUBER, PHILLIP WIESER, STEFAN NACHTNEBEL, CHRISTIAN SCHANES, AND
THOMAS GRECHENIG
KEY DERIVATION FUNCTION: THE SCKDF SCHEME 125
CHAI WEN CHUAH, EDWARD DAWSON, AND LEONIE SIMPSON
HTTP://D-NB.INFO/1035341506
IMAGE 2
XII TABLE OF CONTENTS
SUSTAINABLE PSEUDO-RANDOM NUMBER GENERATOR 139
HUAJEI ZHU, WEE-SIONG NG, AND SEE-KIONG NG
SOFTWARE SECURITY
IMPROVING MOBILE DEVICE SECURITY WITH OPERATING SYSTEM-LEVEL
VIRTUALIZATION 148
SASCHA WESSEL, FREDERIC STUMPF, ILJA HERDT, AND CLAUDIA, ECKERT
GENERATING REALISTIC APPLICATION WORKLOADS FOR MIX-BASED SYSTEMS FOR
CONTROLLABLE, REPEATABLE AND USABLE EXPERIMENTATION 162
KARL-PETER FUCHS, DOMINIK HERRMANN, AND HANNES FEDERRATH
AN EMPIRICAL EVALUATION OF THE ANDROID SECURITY FRAMEWORK 176
ALESSANDRO ARMANDO, ALESSIO MERLO, AND LUCA VERDERAME
A SECURITY ENGINEERING PROCESS APPROACH FOR THE FUTURE DEVELOPMENT OF
COMPLEX AIRCRAFT CABIN SYSTEMS 190
HARTMUT HINTZE, BENJAMIN WIEGRAEFE, AND RALF GOD
MOBILE DEVICE ENCRYPTION SYSTEMS 203
PETER TEUFL, THOMAS ZEFFERER, AND CHRISTOF STROM,BERGER
SMARTPHONE VOLATILE MEMORY ACQUISITION FOR SECURITY ANALYSIS AND
FORENSICS INVESTIGATION 217
VRIZLYNN L.L. THING AND ZHENG-LEONG CHUA
PROGRAM TRANSFORMATION FOR NON-INTERFERENCE VERIFICATION ON PROGRAMS
WITH POINTERS 231
MOUNIR ASSAF, JULIEN SIGNOLES, FREDERIC TRONEL, AND ERIC TOTEL
POLICY COMPLIANCE AND OBLIGATIONS
A VIABLE SYSTEM MODEL FOR INFORMATION SECURITY GOVERNANCE: ESTABLISHING
A BASELINE OF THE CURRENT INFORMATION SECURITY OPERATIONS SYSTEM 245
EZZA,T ALQURASHI, GARY WILLS, A,ND LESTER GILBERT
A REVIEW OF THE THEORY OF PLANNED BEHAVIOUR IN THE CONTEXT OF
INFORMATION SECURITY POLICY COMPLIANCE 257
TEODOR SORNMESTAD, AND JONAS HALLBERG
PRIVACY PROTECTION
ENFORCEMENT OF PRIVACY REQUIREMENTS PADMANABHAN KRISHNAN AND KOSTYANTYN
VOROBYOV 272
IMAGE 3
TABLE OF CONTENTS XIII
TOWARDS SECURITY-ENHANCED AND PRIVACY-PRESERVING MASHUP COMPOSITIONS 286
HEIDELINDE HOBEL, JOHANNES HEURIX, ARRIIN ANJOMSHOAA, AND EDGAR WEIPPL
ON PRIVACY-PRESERVING WAYS TO PORTING THE AUSTRIAN ELD SYSTEM TO THE
PUBLIC CLOUD 300
BERND ZWATTENDORFER AND DANIEL SLAMANIG
RISK ANALYSIS AND SECURITY METRICS
USING THE CONFLICTING INCENTIVES RISK ANALYSIS METHOD 315
LISA RAJBHANDARI AND EINAR SNEKKENES
PERFORMANCE ANALYSIS OF SCALABLE ATTACK REPRESENTATION MODELS 330 JIN B.
HONG AND DONG SEONG KIM
ADAPT: A GAME INSPIRED ATTACK-DEFENSE AND PERFORMANCE METRIC TAXONOMY
344
CHRIS B. SIMMONS, SAJJAN G. SHIVA, HARKEERAT SINGH BEDI, AND VIVEK
SHANDILYA
SOCIAL ENGINEERING
PHISHING FOR THE TRUTH: A SCENARIO-BASED EXPERIMENT OF USERS
BEHAVIOURAL RESPONSE TO EMAILS 366
KATHRYN PARSONS, AGATA MCCORMAC, MALCOLM, PATTINSON, MARCUS BUTAVICIUS,
AND CATE JERRAM
PHISHING AND ORGANISATIONAL LEARNING 379
WAYNE D. KEARNEY AND HENNIE A. KRUGER
A CASE FOR SOCIETAL DIGITAL SECURITY CULTURE 391
LOTFI BEN OTHMANE, HAROLD WEFFERS, ROH.IT RANCHAL, PELIN ANGIN, BHARAT
BHARGAVA, AND MOHD MURTADHA, MOHAMAD
SECURITY MANAGEMENT/FORENSIC
SECURE OUTSOURCING: AN INVESTIGATION OF THE FIT BETWEEN CLIENTS AND
PROVIDERS 405
GURPREET DHILLON, ROMILLA CHOWDHURI, AND FILIPE DE SA-SOARES
PERFORMANCE ANALYSIS OF FILE CARVING TOOLS 419
THOMAS LAURENSON
AUTHOR INDEX 435
|
any_adam_object | 1 |
author2 | Janczewski, Lech 1943- |
author2_role | edt |
author2_variant | l j lj |
author_GND | (DE-588)173435300 |
author_facet | Janczewski, Lech 1943- |
building | Verbundindex |
bvnumber | BV041548234 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)859020215 (DE-599)DNB1035341506 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03332nam a2200673 cb4500</leader><controlfield tag="001">BV041548234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220224 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">140108s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N23</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,A39</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1035341506</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642392177</subfield><subfield code="c">Pp. : ca. EUR 112.35 (DE) (freier Pr.), ca. EUR 115.50 (AT) (freier Pr.), ca. sfr 140.00 (freier Pr.)</subfield><subfield code="9">978-3-642-39217-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642392172</subfield><subfield code="9">3-642-39217-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642392177</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86290062</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859020215</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1035341506</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy protection in information processing systems</subfield><subfield code="b">28th IFIP TC 11 international conference ; proceedings</subfield><subfield code="c">SEC 2013, Auckland, New Zealand, July 8 - 10, 2013. Lech J. Janczewski ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Berlin ; Heidelberg]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 436 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IFIP advances in information and communication technology</subfield><subfield code="v">405</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">08.07.2013-10.07.2013</subfield><subfield code="z">Auckland</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Janczewski, Lech</subfield><subfield code="d">1943-</subfield><subfield code="0">(DE-588)173435300</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Federation for Information Processing</subfield><subfield code="b">Technical Committee Security and Privacy Protection in Information Processing Systems</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)10360013-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SEC</subfield><subfield code="n">28</subfield><subfield code="d">2013</subfield><subfield code="c">Auckland</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1038799988</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Security and Privacy Protection in Information Processing Systems</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IFIP advances in information and communication technology</subfield><subfield code="v">405</subfield><subfield code="w">(DE-604)BV036592990</subfield><subfield code="9">405</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4352613&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994038&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026994038</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 08.07.2013-10.07.2013 Auckland gnd-content |
genre_facet | Konferenzschrift 08.07.2013-10.07.2013 Auckland |
id | DE-604.BV041548234 |
illustrated | Illustrated |
indexdate | 2024-12-20T16:48:52Z |
institution | BVB |
institution_GND | (DE-588)10360013-9 (DE-588)1038799988 |
isbn | 9783642392177 3642392172 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026994038 |
oclc_num | 859020215 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XIII, 436 S. graph. Darst. 24 cm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | IFIP advances in information and communication technology |
series2 | IFIP advances in information and communication technology |
spellingShingle | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings IFIP advances in information and communication technology Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Mobile Computing (DE-588)4694120-4 gnd Computersicherheit (DE-588)4274324-2 gnd Softwareschutz (DE-588)4131649-6 gnd Netzwerktopologie (DE-588)4208537-8 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4123980-5 (DE-588)4308416-3 (DE-588)4694120-4 (DE-588)4274324-2 (DE-588)4131649-6 (DE-588)4208537-8 (DE-588)1071861417 |
title | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings |
title_auth | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings |
title_exact_search | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings |
title_full | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings SEC 2013, Auckland, New Zealand, July 8 - 10, 2013. Lech J. Janczewski ... (eds.) |
title_fullStr | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings SEC 2013, Auckland, New Zealand, July 8 - 10, 2013. Lech J. Janczewski ... (eds.) |
title_full_unstemmed | Security and privacy protection in information processing systems 28th IFIP TC 11 international conference ; proceedings SEC 2013, Auckland, New Zealand, July 8 - 10, 2013. Lech J. Janczewski ... (eds.) |
title_short | Security and privacy protection in information processing systems |
title_sort | security and privacy protection in information processing systems 28th ifip tc 11 international conference proceedings |
title_sub | 28th IFIP TC 11 international conference ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Mobile Computing (DE-588)4694120-4 gnd Computersicherheit (DE-588)4274324-2 gnd Softwareschutz (DE-588)4131649-6 gnd Netzwerktopologie (DE-588)4208537-8 gnd |
topic_facet | Datensicherung Kryptologie Privatsphäre Internet Mobile Computing Computersicherheit Softwareschutz Netzwerktopologie Konferenzschrift 08.07.2013-10.07.2013 Auckland |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4352613&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026994038&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV036592990 |
work_keys_str_mv | AT janczewskilech securityandprivacyprotectionininformationprocessingsystems28thifiptc11internationalconferenceproceedings AT internationalfederationforinformationprocessingtechnicalcommitteesecurityandprivacyprotectionininformationprocessingsystems securityandprivacyprotectionininformationprocessingsystems28thifiptc11internationalconferenceproceedings AT secauckland securityandprivacyprotectionininformationprocessingsystems28thifiptc11internationalconferenceproceedings |