Lectures on data security: modern cryptology in theory and practice
"This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptology. In accordance with the educational objectives of the school, elementary introductions are...
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
1999
|
Schriftenreihe: | Lecture notes in computer science
1561 |
Schlagworte: | |
Zusammenfassung: | "This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptology. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology."--BOOK JACKET. |
Beschreibung: | 250 S. graph. Darst. |
ISBN: | 3540657576 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV012430305 | ||
003 | DE-604 | ||
005 | 19990609 | ||
007 | t| | ||
008 | 990223s1999 gw d||| |||| 10||| eng d | ||
016 | 7 | |a 955830443 |2 DE-101 | |
020 | |a 3540657576 |9 3-540-65757-6 | ||
035 | |a (OCoLC)845204903 | ||
035 | |a (DE-599)BVBBV012430305 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-384 |a DE-739 |a DE-29T |a DE-706 |a DE-521 |a DE-634 |a DE-83 |a DE-188 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a 28 |2 sdnb | ||
245 | 1 | 0 | |a Lectures on data security |b modern cryptology in theory and practice |c Ivan Damgård (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 1999 | |
300 | |a 250 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1561 | |
520 | 1 | |a "This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptology. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology."--BOOK JACKET. | |
650 | 7 | |a Analise combinatoria |2 larpcal | |
650 | 7 | |a Beveiliging |2 gtt | |
650 | 4 | |a Computer security - Congresses | |
650 | 4 | |a Cryptographie | |
650 | 7 | |a Cryptographie |2 ram | |
650 | 4 | |a Cryptography - Congresses | |
650 | 7 | |a Gegevens |2 gtt | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 7 | |a Redes de computadores e tecnicas |2 larpcal | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté |2 ram | |
650 | 4 | |a Sécurité informatique | |
650 | 7 | |a authentification |2 inriac | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a paiement électronique |2 inriac | |
650 | 7 | |a sécurité information |2 inriac | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 1998 |z Århus |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Damgård, Ivan B. |e Sonstige |0 (DE-588)112774180 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1561 |w (DE-604)BV000000607 |9 1561 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-008435425 |
Datensatz im Suchindex
_version_ | 1820874883039494144 |
---|---|
adam_text | |
any_adam_object | |
author_GND | (DE-588)112774180 |
building | Verbundindex |
bvnumber | BV012430305 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)845204903 (DE-599)BVBBV012430305 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV012430305</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19990609</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">990223s1999 gw d||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">955830443</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540657576</subfield><subfield code="9">3-540-65757-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)845204903</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012430305</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lectures on data security</subfield><subfield code="b">modern cryptology in theory and practice</subfield><subfield code="c">Ivan Damgård (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">250 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1561</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptology. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology."--BOOK JACKET.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Analise combinatoria</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Gegevens</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Redes de computadores e tecnicas</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authentification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">paiement électronique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité information</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1998</subfield><subfield code="z">Århus</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Damgård, Ivan B.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)112774180</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1561</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1561</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008435425</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content (DE-588)1071861417 Konferenzschrift 1998 Århus gnd-content |
genre_facet | Aufsatzsammlung Konferenzschrift 1998 Århus |
id | DE-604.BV012430305 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:06:49Z |
institution | BVB |
isbn | 3540657576 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008435425 |
oclc_num | 845204903 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-384 DE-739 DE-29T DE-706 DE-521 DE-634 DE-83 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-384 DE-739 DE-29T DE-706 DE-521 DE-634 DE-83 DE-188 |
physical | 250 S. graph. Darst. |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Lectures on data security modern cryptology in theory and practice Ivan Damgård (ed.) Berlin [u.a.] Springer 1999 250 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1561 "This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptology. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology."--BOOK JACKET. Analise combinatoria larpcal Beveiliging gtt Computer security - Congresses Cryptographie Cryptographie ram Cryptography - Congresses Gegevens gtt Geheimschrift gtt Redes de computadores e tecnicas larpcal Systèmes informatiques - Mesures de sûreté ram Sécurité informatique authentification inriac cryptographie inriac paiement électronique inriac sécurité information inriac Computer security Cryptography Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content (DE-588)1071861417 Konferenzschrift 1998 Århus gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Datensicherung (DE-588)4011144-1 s Damgård, Ivan B. Sonstige (DE-588)112774180 oth Lecture notes in computer science 1561 (DE-604)BV000000607 1561 |
spellingShingle | Lectures on data security modern cryptology in theory and practice Lecture notes in computer science Analise combinatoria larpcal Beveiliging gtt Computer security - Congresses Cryptographie Cryptographie ram Cryptography - Congresses Gegevens gtt Geheimschrift gtt Redes de computadores e tecnicas larpcal Systèmes informatiques - Mesures de sûreté ram Sécurité informatique authentification inriac cryptographie inriac paiement électronique inriac sécurité information inriac Computer security Cryptography Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4143413-4 (DE-588)1071861417 |
title | Lectures on data security modern cryptology in theory and practice |
title_auth | Lectures on data security modern cryptology in theory and practice |
title_exact_search | Lectures on data security modern cryptology in theory and practice |
title_full | Lectures on data security modern cryptology in theory and practice Ivan Damgård (ed.) |
title_fullStr | Lectures on data security modern cryptology in theory and practice Ivan Damgård (ed.) |
title_full_unstemmed | Lectures on data security modern cryptology in theory and practice Ivan Damgård (ed.) |
title_short | Lectures on data security |
title_sort | lectures on data security modern cryptology in theory and practice |
title_sub | modern cryptology in theory and practice |
topic | Analise combinatoria larpcal Beveiliging gtt Computer security - Congresses Cryptographie Cryptographie ram Cryptography - Congresses Gegevens gtt Geheimschrift gtt Redes de computadores e tecnicas larpcal Systèmes informatiques - Mesures de sûreté ram Sécurité informatique authentification inriac cryptographie inriac paiement électronique inriac sécurité information inriac Computer security Cryptography Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Analise combinatoria Beveiliging Computer security - Congresses Cryptographie Cryptography - Congresses Gegevens Geheimschrift Redes de computadores e tecnicas Systèmes informatiques - Mesures de sûreté Sécurité informatique authentification cryptographie paiement électronique sécurité information Computer security Cryptography Datensicherung Kryptologie Aufsatzsammlung Konferenzschrift 1998 Århus |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT damgardivanb lecturesondatasecuritymoderncryptologyintheoryandpractice |