Public key cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London
Springer
2001
|
Schriftenreihe: | Lecture notes in computer science
1992 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XI, 421 S. |
ISBN: | 3540416587 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV013547182 | ||
003 | DE-604 | ||
005 | 20020625 | ||
007 | t | ||
008 | 010116s2001 gw |||| 10||| eng d | ||
016 | 7 | |a 960470352 |2 DE-101 | |
020 | |a 3540416587 |9 3-540-41658-7 | ||
035 | |a (OCoLC)45835537 | ||
035 | |a (DE-599)BVBBV013547182 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-739 |a DE-384 |a DE-29T |a DE-92 |a DE-824 |a DE-83 |a DE-188 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 21 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Public key cryptography |b 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings |c Kwangjo Kim (ed.) |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London |b Springer |c 2001 | |
300 | |a XI, 421 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1992 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Chiffrement (Informatique) - Congrès | |
650 | 7 | |a Chipkaart |2 gtt | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 4 | |a Cryptographie à clé publique - Congrès | |
650 | 7 | |a Cryptographie à clé publique - Congrès |2 ram | |
650 | 7 | |a Geheimschrift |2 gtt | |
650 | 4 | |a Ordinateurs - Accès - Contrôle - Congrès | |
650 | 7 | |a RSA |2 inriac | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté - Congrès |2 ram | |
650 | 4 | |a Sécurité informatique - Congrès | |
650 | 7 | |a clé publique |2 inriac | |
650 | 7 | |a courbe elliptique |2 inriac | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a signature numérique |2 inriac | |
650 | 7 | |a sécurité informatique |2 inriac | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 4 | |a Data encryption (Computer science) |v Congresses | |
650 | 4 | |a Public key cryptography |v Congresses | |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2001 |z Cheju |2 gnd-content | |
689 | 0 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kim, Kwang-jo |e Sonstige |4 oth | |
711 | 2 | |a International Workshop on Practice and Theory in Public Key Cryptosystems |n 4 |d 2001 |c Jeju |j Sonstige |0 (DE-588)10014078-6 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1992 |w (DE-604)BV000000607 |9 1992 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009250847&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805068572574089216 |
---|---|
adam_text |
TABLE
OF
CONTENTS
ON
THE
SECURITY
OF
A
WILLIAMS
BASED
PUBLIC
KEY
ENCRYPTION
SCHEME
.
1
SIGUNA
MULLER
(UNIV,
OF
KLAGENFURT,
AUSTRIA)
SEMANTICALLY
SECURE
MCELIECE
PUBLIC-KEY
CRYPTOSYSTEMS
-
CONVERSIONS
FOR
MCELIECE
PKC
-
.
19
KAZUKUNI
KOBARA
AND
HIDEKI
IMAI
(UNIV,
OF
TOKYO,
JAPAN)
IND-CCA
PUBLIC
KEY
SCHEMES
EQUIVALENT
TO
FACTORING
N
=
PQ
.
36
KAORU
KUROSAWA,
WAKAHA
OGATA,
TOSHIHIKO
MATSUO,
AND
SHUICHI
MAKISHIMA,
(TOKYO
INST,
OF
TECH.,
JAPAN)
IDENTIFICATION,
SIGNATURE
AND
SIGNCRYPTION
USING
HIGH
ORDER
RESIDUES
MODULO
AN
RSA
COMPOSITE
.
48
YULIANG
ZHENG
(MONASH
UNIV.,
AUSTRALIA)
ON
THE
SECURITY
OF
LENSTRA
'
S
VARIANT
OF
DSA
WITHOUT
LONG
INVERSIONS
.
64
ARJEN
K.
LENSTRA
(
CITIBANK,
USA
)
AND
IGOR
E.
SHPARLINSKI
(MACQUARIE
UNIV.,
AUSTRALIA)
FAST
IRREDUCIBILITY
AND
SUBGROUP
MEMBERSHIP
TESTING
IN
XTR
.
73
ARJEN
K.
LENSTRA
(
CITIBANK,
USA
)
AND
ERIC
R.
VERHEUL
(PRICEWARTERHOUSECOOPERS,
NETHERLANDS)
A
NEW
ASPECT
FOR
SECURITY
NOTIONS:
SECURE
RANDOMNESS
IN
PUBLIC-KEY
ENCRYPTION
SCHEMES
.
87
TAKESHI
KOSHIBA
(FUJITSU,
JAPAN)
THE
GAP-PROBLEMS:
A
NEW
CLASS
OF
PROBLEMS
FOR
THE
SECURITY
OF
CRYPTOGRAPHIC
SCHEMES
.
104
TATSUAKI
OKAMOTO
(NTT,
JAPAN)
AND
DAVID
POINTCHEVAL
(ENS,
FRANCE)
A
GENERALISATION,
A
SIMPLIFICATION
AND
SOME
APPLICATIONS
OF
PAILLIER
'
S
PROBABILISTIC
PUBLIC-KEY
SYSTEM
.
119
IVAN
DAMGDRD
AND
MADS
JURIK
(UNIV,
OF
AARHUS,
DENMARK)
MARKING:
A
PRIVACY
PROTECTING
APPROACH
AGAINST
BLACKMAILING
.
137
DENNIS
KUGLER
AND
HOLGER
VOGT
(DARMSTADT
UNIV,
OF
TECH.,
GERMANY)
CRYPTANALYSIS
OF
TWO
SPARSE
POLYNOMIAL
BASED
PUBLIC
KEY
CRYPTOSYSTEMS
.
153
FENG
BAO,
ROBERT
H.
DENG
(KENT
RIDGE
DIGITAL
LABS,
SINGAPORE),
WILLI
GEISELMANN
(UNIV,
OF
KARLSRUHE,
GERMANY),
CLAUS
SCHNORR
(FRANKFURT
UNIV.,
GERMANY),
RAINER
STEINWANDT
(UNIV,
OF
KARLSRUHE,
GERMANY),
AND
HONGJUN
WU
(KENT
RIDGE
DIGITAL
LABS,
SINGAPORE)
CRYPTANALYSIS
OF
PKP:
A
NEW
APPROACH
.
165
ELIANE
JAULMES
AND
ANTOINE
JOUX
(DCSSI,
FRANCE)
X
TABLE
OF
CONTENTS
CRYPTANALYSIS
OF
A
DIGITAL
SIGNATURE
SCHEME
ON
ID-BASED
KEY-SHARING
INFRASTRUCTURES
.
173
HONGJUN
WU,
FENG
BAO,
AND
ROBERT
H.
DENG
(KENT
RIDGE
DIGITAL
LABS,
SINGAPORE)
LOOPHOLES
IN
TWO
PUBLIC
KEY
CRYPTOSYSTEMS
USING
THE
MODULAR
GROUP
.
180
RAINER
STEINWANDT
(UNIV,
OF
KARLSRUHE,
GERMANY)
EFFICIENT
REVOCATION
IN
GROUP
SIGNATURES
.
190
EMMANUEL
BRESSON
AND
JACQUES
STEM
(ENS,
FRANCE)
A
PUBLIC-KEY
TRAITOR
TRACING
SCHEME
WITH
REVOCATION
USING
DYNAMIC
SHARES
.
207
WEN-GUEY
TZENG
AND
ZHI-JIA
TZENG
(NAT.
CHIAO
TUNG
UNIV.,
TAIWAN)
EFFICIENT
ASYMMETRIC
SELF-ENFORCEMENT
SCHEME
WITH
PUBLIC
TRACEABILITY
.
225
HIROTAKA
KOMAKI,
YUJI
WATANABE,
GOICHIRO
HANAOKA,
AND
HIDEKI
IMAI
(UNIV,
OF
TOKYO,
JAPAN)
ADAPTIVE
SECURITY
FOR
THE
ADDITIVE-SHARING
BASED
PROACTIVE
RSA
.
240
YAIR
FRANKEL
(ECASH
TECH.,
USA),
PHILIP
D.
MACKENZIE
(BELL
LABS,
USA
),
AND
MOTI
YUNG
(
CERTCO,
USA
)
ROBUST
FORWARD-SECURE
SIGNATURE
SCHEMES
WITH
PROACTIVE
SECURITY
.
264
WEN-GUEY
TZENG
AND
ZHI-JIA
TZENG
(NAT.
CHIAO
TUNG
UNIV.,
TAIWAN)
EQUITABILITY
IN
RETROACTIVE
DATA
CONFISCATION
VERSUS
PROACTIVE
KEY
ESCROW
.
277
YVO
DESMEDT
(FLORIDA
STATE
UNIV.,
USA),
MIKE
BURMESTER
(ROYAL
HOLLOWAY
UNIV,
OF
LONDON,
UK),
AND
JENNIFER
SEBERRY
(UNIV,
OF
WOLLONGONG,
AUSTRALIA)
A
PVSS
AS
HARD
AS
DISCRETE
LOG
AND
SHAREHOLDER
SEPARABILITY
.
287
ADAM
YOUNG
(COLUMBIA
UNIV.,
USA)
AND
MOTI
YUNG
(CERTCO,
USA)
ONE
ROUND
THRESHOLD
DISCRETE-LOG
KEY
GENERATION
WITHOUT
PRIVATE
CHANNELS
.
300
PIERRE-ALAIN
FOUQUE
AND
JACQUES
STEM
(ENS,
FRANCE)
REMARKS
ON
MIX-NETWORK
BASED
ON
PERMUTATION
NETWORKS
.
317
MASAYUKI
ABE
AND
FUMITAKA
HOSHINO
(NTT,
JAPAN)
NEW
KEY
RECOVERY
IN
WAKE
PROTOCOL
.
325
CHONG
HEE
KIM
AND
PIL
JOONG
LEE
(POSTECH,
KOREA)
REDUNDANT
REPRESENTATION
OF
FINITE
FIELDS
.
339
WILLI
GEISELMANN
AND
HARALD
LUKHAUB
(UNIV,
OF
KARLSRUHE,
GERMANY)
TABLE
OF
CONTENTS
XI
COMPACT
ENCODING
OF
NON-ADJACENT
FORMS
WITH
APPLICATIONS
TO
ELLIPTIC
CURVE
CRYPTOGRAPHY
.
353
MARC
JOYE
AND
CHRISTOPHE
TYMEN
(GEMPLUS,
FRANCE)
EFFICIENT
IMPLEMENTATION
OF
ELLIPTIC
CURVE
CRYPTOSYSTEMS
ON
THE
TI
MSP430X33X
FAMILY
OF MICROCONTROLLERS
.
365
JORGE
GUAJARDO
(WPI,
USA
),
RAINER
BLIIMEL,
UWE
KRIEGER
(CRYPTOVISION,
GERMANY),
AND
CHRISTOF
PAAR
(WPI,
USA)
SECURE
SERVER-AIDED
SIGNATURE
GENERATION
.
383
MARKUS
JAKOBSSON
AND
SUSANNE
WETZEL
(BELL
LABS,
USA)
EFFICIENT
LONG-TERM
VALIDATION
OF
DIGITAL
SIGNATURES
.
402
ARNE
ANSPER,
AHTO
BULDAS,
MEELIS
ROOS,
AND
JAN
WILLEMSON
(CYBEMETICA,
ESTONIA)
A
NOVEL
SYSTOLIC
ARCHITECTURE
FOR
AN
EFFICIENT
RSA
IMPLEMENTATION
.
416
NIKOS
K.
MOSHOPOULOS
AND
K.
Z.
PEKMESTZI
(NAT.
TECH.
UNIV,
OF
ATHENS,
GREECE)
AUTHOR
INDEX
.
423 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV013547182 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)45835537 (DE-599)BVBBV013547182 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008cb4500</leader><controlfield tag="001">BV013547182</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20020625</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">010116s2001 gw |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">960470352</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540416587</subfield><subfield code="9">3-540-41658-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)45835537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013547182</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public key cryptography</subfield><subfield code="b">4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings</subfield><subfield code="c">Kwangjo Kim (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 421 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1992</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique) - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Chipkaart</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie à clé publique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie à clé publique - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">RSA</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">clé publique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">courbe elliptique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">signature numérique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité informatique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2001</subfield><subfield code="z">Cheju</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Kwang-jo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Practice and Theory in Public Key Cryptosystems</subfield><subfield code="n">4</subfield><subfield code="d">2001</subfield><subfield code="c">Jeju</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10014078-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1992</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1992</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009250847&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2001 Cheju gnd-content |
genre_facet | Konferenzschrift 2001 Cheju |
id | DE-604.BV013547182 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T03:52:15Z |
institution | BVB |
institution_GND | (DE-588)10014078-6 |
isbn | 3540416587 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009250847 |
oclc_num | 45835537 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-739 DE-384 DE-29T DE-92 DE-824 DE-83 DE-188 DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-739 DE-384 DE-29T DE-92 DE-824 DE-83 DE-188 DE-706 |
physical | XI, 421 S. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings Kwangjo Kim (ed.) Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London Springer 2001 XI, 421 S. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1992 Literaturangaben Chiffrement (Informatique) - Congrès Chipkaart gtt Computerbeveiliging gtt Cryptographie à clé publique - Congrès Cryptographie à clé publique - Congrès ram Geheimschrift gtt Ordinateurs - Accès - Contrôle - Congrès RSA inriac Systèmes informatiques - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès clé publique inriac courbe elliptique inriac cryptographie inriac signature numérique inriac sécurité informatique inriac Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Public key cryptography Congresses Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2001 Cheju gnd-content Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Kim, Kwang-jo Sonstige oth International Workshop on Practice and Theory in Public Key Cryptosystems 4 2001 Jeju Sonstige (DE-588)10014078-6 oth Lecture notes in computer science 1992 (DE-604)BV000000607 1992 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009250847&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings Lecture notes in computer science Chiffrement (Informatique) - Congrès Chipkaart gtt Computerbeveiliging gtt Cryptographie à clé publique - Congrès Cryptographie à clé publique - Congrès ram Geheimschrift gtt Ordinateurs - Accès - Contrôle - Congrès RSA inriac Systèmes informatiques - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès clé publique inriac courbe elliptique inriac cryptographie inriac signature numérique inriac sécurité informatique inriac Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Public key cryptography Congresses Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4209133-0 (DE-588)1071861417 |
title | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings |
title_auth | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings |
title_exact_search | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings |
title_full | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings Kwangjo Kim (ed.) |
title_fullStr | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings Kwangjo Kim (ed.) |
title_full_unstemmed | Public key cryptography 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings Kwangjo Kim (ed.) |
title_short | Public key cryptography |
title_sort | public key cryptography 4th international workshop on practice and theory in public key cryptosystems pkc 2001 cheju island korea february 13 15 2001 proceedings |
title_sub | 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13 - 15, 2001 ; proceedings |
topic | Chiffrement (Informatique) - Congrès Chipkaart gtt Computerbeveiliging gtt Cryptographie à clé publique - Congrès Cryptographie à clé publique - Congrès ram Geheimschrift gtt Ordinateurs - Accès - Contrôle - Congrès RSA inriac Systèmes informatiques - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès clé publique inriac courbe elliptique inriac cryptographie inriac signature numérique inriac sécurité informatique inriac Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Public key cryptography Congresses Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Chiffrement (Informatique) - Congrès Chipkaart Computerbeveiliging Cryptographie à clé publique - Congrès Geheimschrift Ordinateurs - Accès - Contrôle - Congrès RSA Systèmes informatiques - Mesures de sûreté - Congrès Sécurité informatique - Congrès clé publique courbe elliptique cryptographie signature numérique sécurité informatique Computer security Congresses Computers Access control Congresses Data encryption (Computer science) Congresses Public key cryptography Congresses Public-Key-Kryptosystem Konferenzschrift 2001 Cheju |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009250847&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kimkwangjo publickeycryptography4thinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2001chejuislandkoreafebruary13152001proceedings AT internationalworkshoponpracticeandtheoryinpublickeycryptosystemsjeju publickeycryptography4thinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2001chejuislandkoreafebruary13152001proceedings |