Digital signature schemes: general framework and fail stop signatures
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | German |
Veröffentlicht: |
Berlin u.a.
Springer
1996
|
Schriftenreihe: | Lecture notes in computer science
1100 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVI, 396 S. graph. Darst. |
ISBN: | 3540615172 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV010853823 | ||
003 | DE-604 | ||
005 | 19970512 | ||
007 | t| | ||
008 | 960708s1996 gw d||| m||| 00||| ger d | ||
016 | 7 | |a 947875689 |2 DE-101 | |
020 | |a 3540615172 |c kart. : DM 78.00 |9 3-540-61517-2 | ||
035 | |a (OCoLC)35029759 | ||
035 | |a (DE-599)BVBBV010853823 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a ger | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-739 |a DE-384 |a DE-29T |a DE-19 |a DE-20 |a DE-706 |a DE-634 |a DE-83 | ||
050 | 0 | |a QA76.9.A25P444 1996 | |
082 | 0 | |a 005.8 |2 20 | |
082 | 0 | |a 005.8 20 | |
084 | |a DAT 582f |2 stub | ||
084 | |a 28 |2 sdnb | ||
100 | 1 | |a Pfitzmann, Birgit |e Verfasser |4 aut | |
245 | 1 | 0 | |a Digital signature schemes |b general framework and fail stop signatures |c Birgit Pfitzmann |
264 | 1 | |a Berlin u.a. |b Springer |c 1996 | |
300 | |a XVI, 396 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1100 | |
502 | |a Zugl.: Hildesheim, Univ., Diss., 1993 | ||
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a Cryptographie |2 ram | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 4 | |a Signatures | |
650 | 7 | |a Signatures |2 ram | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté |2 ram | |
650 | 4 | |a Sécurité informatique | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a signature numérique |2 inriac | |
650 | 7 | |a sécurité |2 inriac | |
650 | 4 | |a Computer security | |
650 | 4 | |a Signatures (Writing) | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 0 | |5 DE-604 | |
830 | 0 | |a Lecture notes in computer science |v 1100 |w (DE-604)BV000000607 |9 1100 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007255511&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-007255511 |
Datensatz im Suchindex
_version_ | 1820874850797879296 |
---|---|
adam_text |
CONTENTS
1
REQUIREMENTS
ON
DIGITAL
SIGNATURE
SCHEMES
.
1
1.1
BRIEF
SURVEY
OF
APPLICATIONS
.
1
1.2
LEGAL
SIGNIFICANCE
OF
SIGNATURES
.
2
1.3
CONSEQUENCES
OF
THE
LEGAL
SIGNIFICANCE
.
4
1.4
SECURE
HARDWARE
SUPPORT
.
6
1.5
RELATION
TO
OTHER
TYPES
OF
SCHEMES
.
8
1.6
A
VARIANT:
INVISIBLE
SIGNATURES
.
10
2
HISTORY
OF
DIGITAL
SIGNATURE
SCHEMES
.
11
2.1
CLASSICAL
CRYPTOGRAPHY
.
11
2.2
INFORMATION-THEORETICALLY
SECURE
SYMMETRIC
SCHEMES
.
12
2.3
INVENTION
OF
DIGITAL
SIGNATURE
SCHEMES
.
13
2.4
INTUITIVELY
CONSTRUCTED
DIGITAL
SIGNATURE
SCHEMES
.
18
2.5
PROBLEMS,
COUNTERMEASURES,
AND
EMERGING
SECURITY
NOTIONS
.
22
2.6
"
PROVABLY
SECURE
"
DIGITAL
SIGNATURE
SCHEMES
.
25
2.7
SPECIAL
VARIANTS
.
28
2.7.1
SPECIAL
SIGNATURE
SCHEMES
.
28
2.7.2
SIGNATURE-RELATED
SCHEMES
.
29
3
INFORMATION-THEORETIC
SECURITY
FOR
SIGNERS:
INTRODUCTION
.
33
3.1
PROBLEMS
WITH
ORDINARY
DIGITAL
SIGNATURE
SCHEMES
.
33
3.2
ONE
NEW
TYPE:
FAIL-STOP
SIGNATURE
SCHEMES
.
35
4
TERMINOLOGY
.
37
4.1
GENERAL
NOTATION
.
37
4.2
PROBABILITIES
AND
PROBABILISTIC
FUNCTIONS
.
37
4.3
COMPLEXITY
.
38
4.4
INTERACTION
.
40
4.4.1
OVERVIEW
AND
META-TERMINOLOGY
.
40
4.4.2
SOME
TERMINOLOGY
ABOUT
SPECIFICATIONS
.
41
4.4.3
INTERACTIVE
FUNCTIONS
AND
ALGORITHMS
.
42
4.4.4
SYSTEM
STRUCTURE
.
44
4.4.5
ATTACKERS
.
45
4.4.6
SYSTEM
BEHAVIOUR
.
45
4.4.7
DEGREES
OF
FULFILLING
.
46
5
PROPERTIES
OF
DIGITAL
SIGNATURE
SCHEMES
.
47
5.1
THE
MAIN
IDEAS
.
48
5.1.1
THE
IDEAS
AND
THEIR
BACKGROUND
.
48
XII
CONTENTS
5.1.2
PROBLEMS,
ALTERNATIVES,
AND
SIMPLIFICATION
.
51
5.2
SERVICE
.
55
5.2.1
WHAT
KIND
OF
SPECIFICATION?
.
56
5.2.2
OVERVIEW
OF
THE
SERVICES
OF
SIGNATURE
SCHEMES
.
58
5.2.3
REMARKS
ON
THE
GENERALITY
OF
THE
DEFINITION
.
62
5.2.4
INTERFACE
EVENTS
IN
DETAIL
.64
5.2.5
SPECIFICATION
AND
SYSTEM
PARAMETERS
.
72
5.2.6
TOWARDS
FORMALIZATIONS
OF
REQUIREMENTS
.
75
5.2.7
MINIMAL
REQUIREMENTS
.
81
5.2.8
STRONGER
REQUIREMENTS
.
88
5.2.9
MULTIPLE
SPECIFICATIONS
FOR
DIFFERENT
DEGREES
OF
SECURITY
.
91
5.2.10
SPECIAL
SPECIFICATION
PARAMETERS
.96
5.2.11
ADDITIONAL
TRANSACTIONS
.97
5.2.12
PRIVACY
REQUIREMENTS
.
102
5.3
STRUCTURE
.
103
5.3.1
MINIMAL
STRUCTURAL
REQUIREMENTS
.
104
5.3.2
ADDITIONAL
STRUCTURAL
PROPERTIES
.
105
5.4
SECURITY
.
109
5.4.1
ACCESS
OF
ATTACKERS
TO
SYSTEM
PARTS
.
110
5.4.2
INFLUENCE
OF
ATTACKERS
ON
HONEST
USERS
.
112
5.4.3
COMPUTATIONAL
ASSUMPTIONS
AND
NOTIONS
OF
FULFILLING
.
116
5.4.4
SKETCHES
OF
EXPECTED
THEOREMS
AND
PROOFS
.
121
6
OVERVIEW
OF
EXISTING
SCHEMES
WITH
OTHER
THAN
ORDINARY
SECURITY
.
125
6.1
PROPERTIES
.
125
6.1.1
TOP-LEVEL
CLASSIFICATION
.
125
6.1.2
FAIL-STOP
SIGNATURE
SCHEMES
.
126
6.1.3
INVISIBLE
SIGNATURE
SCHEMES
WITH
DUAL
SECURITY
.
131
6.1.4
"
NORMAL
"
SIGNATURE
SCHEMES
WITH
DUAL
SECURITY
.
132
6.1.5
SCHEMES
WITH
INFORMATION-THEORETIC
SECURITY
.
133
6.2
POSSIBLE
APPLICATIONS
AND
LEGAL
SIGNIFICANCE
.
134
6.2.1
POSSIBLE
BENEFITS
OF
DUAL
SECURITY
.
135
6.2.2
POSSIBLE
BENEFITS
OF
FAIL-STOP
SECURITY
.
138
6.3
IMPORTANT
CONSTRUCTION
IDEAS
.
139
6.3.1
CONSTRUCTION
OF
FAIL-STOP
SIGNATURE
SCHEMES
.
140
6.3.2
CONSTRUCTION
OF
INVISIBLE
SIGNATURE
SCHEMES
WITH
DUAL
SECURITY
.
145
6.3.3
CONSTRUCTION
OF
"
NORMAL
"
SIGNATURE
SCHEMES
WITH
DUAL
SECURITY
.
146
6.3.4
CONSTRUCTION
OF
SCHEMES
WITH
INFORMATION-THEORETIC
SECURITY
.
147
CONTENTS
XIII
7
CONVENTIONAL
DEFINITIONS
OF
FAIL-STOP
SIGNATURE
SCHEMES
AND
GENERAL
REDUCTIONS
.
149
7.1
DEFINITION
.
149
7.1.1
CONCENTRATING
ON
SCHEMES
WITH
SPECIAL
RISK
BEARERS
.
150
7.1.2
TOP-DOWN
DERIVATION
OF
THE
COMPONENTS
.
150
7.1.3
BREAKING
DOWN
THE
MINIMAL
REQUIREMENTS
.
161
7.1.4
BREAKING
DOWN
ADDITIONAL
SERVICE
PROPERTIES
.
166
7.1.5
FORMAL
SECURITY
DEFINITIONS
.
168
7.2
RELATIONS
BETWEEN
SECURITY
PROPERTIES
.
175
7.2.1
SECURITY
FOR
THE
SIGNER
"
BACKWARDS
"
.
175
7.2.2
UNFORGEABILITY
.
180
7.3
FAIL-STOP
SIGNATURE
SCHEMES
WITH
PREKEY
.
184
7.3.1
APPROPRIATE
ZERO-KNOWLEDGE
PROOF
SCHEMES
.
185
7.3.2
DEFINITION
OF
SCHEMES
WITH
PREKEY
.
192
7.3.3
SECURITY
OF
SCHEMES
WITH
PREKEY
.
196
7.4
RELATION
TO
ORDINARY
DIGITAL
SIGNATURE
SCHEMES
.
201
7.5
CONSTRUCTIONS
WITH
MANY
RISK
BEARERS
.
203
7.5.1
REPLICATION
OF
INITIALIZATION
.
203
7.5.2
MULTI-PARTY
FUNCTION
EVALUATION
IN
INITIALIZATION
.
207
8
BUILDING
BLOCKS
.
213
8.1
SOME
GROUP
AND
NUMBER
THEORY
.
213
8.1.1
BASIC
FACTS
FROM
GROUP
THEORY
.
213
8.1.2
BASIC
FACTS
ABOUT
RINGS
OF
INTEGERS
MODULO
N
.
214
8.1.3
GENERALIZED
BLUM
INTEGERS
.
216
8.1.4
WILLIAMS
INTEGERS
.
217
8.1.5
THE
DENSITY
OF
PRIMES
.
217
8.2
FUNCTIONS
WITH
LARGE
PREIMAGE
SETS
.
218
8.2.1
DISCRETE-LOGARITHM
CASE:
TUPLE
EXPONENTIATION
.
219
8.2.2
A
CONSTRUCTION
FROM
PAIRS
OF
PERMUTATIONS
.
221
8.2.3
FACTORING
CASE:
ITERATED
SQUARING
AND
DOUBLING
(OR:
A
USEFUL
HOMOMORPHISM
ON
AN
UGLY
GROUP)
.
223
8.3
SOME
EFFICIENT
ALGORITHMS
.
228
8.4
CONCRETE
CRYPTOLOGIC
ASSUMPTIONS
.
230
8.4.1
INTEGER
FACTORING
.
230
8.4.2
DISCRETE
LOGARITHM
.
233
8.5
COLLISION-INTRACTABLE
FUNCTION
FAMILIES
.
240
8.5.1
OVERVIEW
.
240
8.5.2
DEFINITIONS
.
244
8.5.3
CONSTRUCTIONS
IN
THE
DISCRETE-LOGARITHM
CASE
.
253
8.5.4
CONSTRUCTIONS
FROM
CLAW-INTRACTABLE
PAIRS
OF
PERMUTATIONS
.
273
8.5.5
CONSTRUCTIONS
IN
THE
FACTORING
CASE
.
282
XIV
CONTENTS
9
CONSTRUCTIONS
FOR
ONE
MESSAGE
BLOCK
.
289
9.1
DEFINITION
OF
SCHEMES
FOR
SIGNING
MESSAGE
BLOCKS
.
289
9.2
GENERAL
CONSTRUCTION
FRAMEWORK
.
290
9.3
IMPLEMENTATION
BASED
ON
THE
DISCRETE-LOGARITHM
ASSUMPTION
.
299
9.4
IMPLEMENTATIONS
BASED
ON
THE
FACTORING
ASSUMPTION
.
304
9.5
COMPLEXITY
OVERVIEW
.
311
10
SIGNING
MANY
LONG
MESSAGES
.
313
10.1
MESSAGE
HASHING
.
313
10.2
BOTTOM-UP
TREE
AUTHENTICATION
.
322
10.3
TOP-DOWN
TREE
AUTHENTICATION
.
325
10.4
TOP-DOWN
TREE
AUTHENTICATION
WITH
SMALL
AMOUNT
OF
PRIVATE
STORAGE
.
332
10.5
DISCRETE-LOGARITHM
SCHEME
WITH
SHORTER
SECRET
KEY
.
339
10.6
THE
CASE
OF
A
FIXED
RECIPIENT
.
343
11
LOWER
BOUNDS
.
345
11.1
INFORMATION-THEORETIC
BACKGROUND
.
346
11.2
RANDOM
VARIABLES
IN
FAIL-STOP
SIGNATURE
SCHEMES
.
348
11.3
LOWER
BOUND
ON
THE
SECRET
RANDOM
BITS
NEEDED
.
349
11.4
LENGTH
OF
SIGNATURES
AND
PUBLIC
KEYS
.
356
11.5
LOWER
BOUNDS
ON
INFORMATION-THEORETICALLY
SECURE
SIGNATURE
SCHEMES
.
360
11.6
COMPARISON
.
366
REFERENCES
.
371
SYMBOLS
.
387
INDEX
.
391 |
any_adam_object | 1 |
author | Pfitzmann, Birgit |
author_facet | Pfitzmann, Birgit |
author_role | aut |
author_sort | Pfitzmann, Birgit |
author_variant | b p bp |
building | Verbundindex |
bvnumber | BV010853823 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25P444 1996 |
callnumber-search | QA76.9.A25P444 1996 |
callnumber-sort | QA 276.9 A25 P444 41996 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 582f |
ctrlnum | (OCoLC)35029759 (DE-599)BVBBV010853823 |
dewey-full | 005.8 005.820 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 005.8 20 |
dewey-search | 005.8 005.8 20 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV010853823</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19970512</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">960708s1996 gw d||| m||| 00||| ger d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">947875689</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540615172</subfield><subfield code="c">kart. : DM 78.00</subfield><subfield code="9">3-540-61517-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)35029759</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV010853823</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25P444 1996</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 582f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pfitzmann, Birgit</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital signature schemes</subfield><subfield code="b">general framework and fail stop signatures</subfield><subfield code="c">Birgit Pfitzmann</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">1996</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 396 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1100</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Zugl.: Hildesheim, Univ., Diss., 1993</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signatures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Signatures</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">signature numérique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Signatures (Writing)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1100</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1100</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007255511&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-007255511</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV010853823 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:06:18Z |
institution | BVB |
isbn | 3540615172 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-007255511 |
oclc_num | 35029759 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-739 DE-384 DE-29T DE-19 DE-BY-UBM DE-20 DE-706 DE-634 DE-83 |
owner_facet | DE-91G DE-BY-TUM DE-739 DE-384 DE-29T DE-19 DE-BY-UBM DE-20 DE-706 DE-634 DE-83 |
physical | XVI, 396 S. graph. Darst. |
publishDate | 1996 |
publishDateSearch | 1996 |
publishDateSort | 1996 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Pfitzmann, Birgit Verfasser aut Digital signature schemes general framework and fail stop signatures Birgit Pfitzmann Berlin u.a. Springer 1996 XVI, 396 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1100 Zugl.: Hildesheim, Univ., Diss., 1993 Computerbeveiliging gtt Computernetwerken gtt Cryptographie Cryptographie ram Geheimschrift gtt Signatures Signatures ram Systèmes informatiques - Mesures de sûreté ram Sécurité informatique cryptographie inriac signature numérique inriac sécurité inriac Computer security Signatures (Writing) Cryptography Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Elektronische Unterschrift (DE-588)4269037-7 s DE-604 Lecture notes in computer science 1100 (DE-604)BV000000607 1100 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007255511&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Pfitzmann, Birgit Digital signature schemes general framework and fail stop signatures Lecture notes in computer science Computerbeveiliging gtt Computernetwerken gtt Cryptographie Cryptographie ram Geheimschrift gtt Signatures Signatures ram Systèmes informatiques - Mesures de sûreté ram Sécurité informatique cryptographie inriac signature numérique inriac sécurité inriac Computer security Signatures (Writing) Cryptography Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4269037-7 (DE-588)4113937-9 |
title | Digital signature schemes general framework and fail stop signatures |
title_auth | Digital signature schemes general framework and fail stop signatures |
title_exact_search | Digital signature schemes general framework and fail stop signatures |
title_full | Digital signature schemes general framework and fail stop signatures Birgit Pfitzmann |
title_fullStr | Digital signature schemes general framework and fail stop signatures Birgit Pfitzmann |
title_full_unstemmed | Digital signature schemes general framework and fail stop signatures Birgit Pfitzmann |
title_short | Digital signature schemes |
title_sort | digital signature schemes general framework and fail stop signatures |
title_sub | general framework and fail stop signatures |
topic | Computerbeveiliging gtt Computernetwerken gtt Cryptographie Cryptographie ram Geheimschrift gtt Signatures Signatures ram Systèmes informatiques - Mesures de sûreté ram Sécurité informatique cryptographie inriac signature numérique inriac sécurité inriac Computer security Signatures (Writing) Cryptography Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Computerbeveiliging Computernetwerken Cryptographie Geheimschrift Signatures Systèmes informatiques - Mesures de sûreté Sécurité informatique cryptographie signature numérique sécurité Computer security Signatures (Writing) Cryptography Elektronische Unterschrift Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=007255511&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT pfitzmannbirgit digitalsignatureschemesgeneralframeworkandfailstopsignatures |