Applied cryptography and network security: third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2005
|
Schriftenreihe: | Lecture Notes in Computer Science
3531 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | 3531 |
Beschreibung: | XI, 530 S. Ill., graph. Darst. |
ISBN: | 9783540262237 3540262237 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV019860953 | ||
003 | DE-604 | ||
005 | 20080212 | ||
007 | t| | ||
008 | 050628s2005 gw |||| 10||| eng d | ||
015 | |a 05,N23,0017 |2 dnb | ||
016 | 7 | |a 974911976 |2 DE-101 | |
020 | |a 9783540262237 |9 978-3-540-26223-7 | ||
020 | |a 3540262237 |c : ca. EUR 68.48 (freier Pr.), ca. sfr 113.00 (freier Pr.) |9 3-540-26223-7 | ||
024 | 3 | |a 9783540262237 | |
028 | 5 | 2 | |a 11496137 |
035 | |a (OCoLC)60613452 | ||
035 | |a (DE-599)BVBBV019860953 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-739 |a DE-91G |a DE-824 |a DE-706 |a DE-83 |a DE-11 | ||
050 | 0 | |a QA75 | |
050 | 0 | |a TK5102.85 | |
082 | 0 | |a 005.8/2 |2 22 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Applied cryptography and network security |b third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings |c John Ioannidis ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2005 | |
300 | |a XI, 530 S. |c Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 3531 | |
500 | |a 3531 | ||
650 | 4 | |a Chiffrement (Informatique) - Congrès | |
650 | 4 | |a Cryptographie - Congrès | |
650 | 4 | |a Télécommunications - Sécurité - Mesures - Congrès | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 4 | |a Data encryption (Computer science) |v Congresses | |
650 | 4 | |a Telecommunication |x Security measures |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2005 |z New York, NY |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 2 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Ioannidis, John |e Sonstige |4 oth | |
711 | 2 | |a ACNS |n 3 |d 2005 |c New York, NY |j Sonstige |0 (DE-588)10105815-9 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 3531 |w (DE-604)BV000000607 |9 3531 | |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=2632146&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013185459&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-013185459 |
Datensatz im Suchindex
_version_ | 1820874958675378176 |
---|---|
adam_text |
TABLE
OF
CONTENTS
TWO-SERVER
PASSWORD-ONLY
AUTHENTICATED
KEY
EXCHANGE
.
1
JONATHAN
KATZ,
PHILIP
MACKENZIE,
GELAREH
TABAN,
AND
VIRGIL
GLIGOR
STRENGTHENING
PASSWORD-BASED
AUTHENTICATION
PROTOCOLS
AGAINST
ONLINE
DICTIONARY
ATTACKS
.
17
PENG
WANG,
YONGDAE
KIM,
VISHAL
KHER,
AND
TAEKYOUNG
KWON
CRYPTANALYSIS
OF
AN
IMPROVEDCLIENT-TO-CLIENT
PASSWORD-AUTHENTICATED
KEY
EXCHANGE
(C2C-PAKE)
SCHEME
.
33
RAPHAEL
C.-W.
PHAN
AND
BOK-MIN
GOI
EFFICIENT
SECURITY
MECHANISMS
FOR
OVERLAY
MULTICAST-BASED
CONTENT
DISTRIBUTION
.
40
SENCUN
ZHU,
CHAO
YAO,
DONGGANGLIU,
SANJEEV
SETIA,
AND
SUSHIL
JAJODIA
A
TRAITOR
TRACING
SCHEME
BASED
ON
RSA
FOR
FAST
DECRYPTION
.
56
JOHN
PATRICK
MCGREGOR,
YIQUN
LISA
YIN,
AND
RUBY
B.
LEE
N-PARTY
ENCRYPTED
DIFFIE-HELLMAN
KEY
EXCHANGE
USING
DIFFERENT
PASSWORDS
.
75
JIN
WOOK
BYUN
AND
DONG
HOON
LEE
MESSIN'
WITH
TEXAS
DERIVING
MOTHER'S
MAIDEN
NAMES
USING
PUBLIC
RECORDS
.
91
VIRGIL
GRIFFITH
AND
MARKUS
JAKOBSSON
MITIGATING
NETWORK
DENIAL-OF-SERVICE
THROUGH
DIVERSITY-BASED
TRAFFIC
MANAGEMENT
.
104
ASHRAF
MATRAWY,
PAUL
C.
VAN
OORSCHOT,
AND
ANIL
SOMAYAJI
SEARCHING
FOR
HIGH-VALUE
RARE
EVENTS
WITH
UNCHEATABLE
GRID
COMPUTING
.
122
WENLIANG
DU
AND
MICHAEL
T.
GOODRICH
DIGITAL
SIGNATURES
DO
NOT
GUARANTEE
EXCLUSIVE
OWNERSHIP
.
138
THOMAS
PORNIN
AND
JULIEN
P.
STERN
THOMPSON'S
GROUP
AND
PUBLIC
KEY
CRYPTOGRAPHY
.
151
VLADIMIR
SHPILRAIN
AND
ALEXANDER
USHAKOV
RAINBOW,
A
NEW
MULTIVARIABLE
POLYNOMIAL
SIGNATURE
SCHEME
.
164
JINTAI
DING
AND
DIETER
SCHMIDT
BADGER
-
A
FAST
AND
PROVABLY
SECURE
MAC
.
176
MARTIN
BOESGAARD,
THOMAS
CHRISTENSEN,
AND
ERIK
ZENNER
IDS
FALSE
ALARM
REDUCTION
USING
CONTINUOUS
AND
DISCONTINUOUS
PATTERNS
.
192
ABDULRAHMANALHARBY
AND
HIDEKI
IMAI
X
TABLE
OF
CONTENTS
INDEXING
INFORMATIONFOR
DATA
FORENSICS
.
206
MICHAEL
T.
GOODRICH,
MIKHAIL
J.
ATALLAH,
AND
ROBERTO
TAMASSIA
MODEL
GENERALIZATION
AND
ITS
IMPLICATIONS
ON
INTRUSION
DETECTION
.
222
ZHUOWEI
LI,
AMITABHA
DAS,
AND
JIANYING
ZHOU
INTRUSION-RESILIENT
SECURE
CHANNELS
.
238
GENE
ITKIS,
ROBERT
MCNERNEY
JR.,
AND
SCOTT
RUSSELL
OPTIMAL
ASYMMETRIC
ENCRYPTION
AND
SIGNATURE
PADDINGS
.
254
BENO
YY
YYT
CHEVALLIER-MAMES,
DUONG
HIEU
PHAN,
AND
DAVID
POINTCHEVAL
EFFICIENT
AND
LEAKAGE-RESILIENT
AUTHENTICATED
KEY
TRANSPORT
PROTOCOL
BASED
ON
RSA
.
269
SEONGHANSHIN,
KAZUKUNI
KOBARA,
AND
HIDEKI
IMAI
IDENTITY
BASED
ENCRYPTION
WITHOUT
REDUNDANCY
.
285
BENO
YY
YYT
LIBERT
AND
JEAN-JACQUES
QUISQUATER
OACERTS:
OBLIVIOUS
ATTRIBUTE
CERTIFICATES
.
301
JIANGTAO
LI
AND
NINGHUI
LI
DYNAMIC
K
-TIMES
ANONYMOUS
AUTHENTICATION
.
318
LAN
NGUYEN
AND
REI
SAFAVI-NAINI
EFFICIENT
ANONYMOUSROAMING
AND
ITS
SECURITY
ANALYSIS
.
334
GUOMIN
YANG,
DUNCAN
S.
WONG,
AND
XIAOTIE
DENG
QUANTIFYING
SECURITY
IN
HYBRID
CELLULAR
NETWORKS
.
350
MARKUS
JAKOBSSON
AND
LIU
YANG
OFF-LINE
KARMA:
A
DECENTRALIZED
CURRENCY
FOR
PEER-TO-PEER
AND
GRID
APPLICATIONS
.
364
FLAVIO
D.
GARCIA
AND
JAAP-HENK
HOEPMAN
BUILDING
RELIABLE
MIX
NETWORKS
WITH
FAIR
EXCHANGE
.
378
MICHAEL
K.
REITER,
XIAOFENG
WANG,
AND
MATTHEW
WRIGHT
SCARE
OF
THE
DES
(SIDE
CHANNEL
ANALYSIS
FOR
REVERSE
ENGINEERING
OF
THE
DATA
ENCRYPTIONSTANDARD)
.
393
R
´
EMY
DAUDIGNY,
HERV
´
ELE
D
I
G,FR
´
ED
´
ERIC
MULLER,
AND
FR
´
ED
´
ERIC
VALETTE
ROBUST
KEY
EXTRACTION
FROM
PHYSICAL
UNCLONEABLE
FUNCTIONS
.
407
B.
YY
SKORI
´
C,
P.
TUYLS,
AND
W.
OPHEY
EFFICIENT
CONSTRUCTIONS
FOR
ONE-WAY
HASH
CHAINS
.
423
YIH-CHUN
HU,
MARKUS
JAKOBSSON,
AND
ADRIAN
PERRIG
PRIVACY
PRESERVING
KEYWORD
SEARCHES
ON
REMOTE
ENCRYPTED
DATA
.
442
YAN-CHENG
CHANG
AND
MICHAEL
MITZENMACHER
TABLE
OF
CONTENTS
XI
AN
EFFICIENT
SOLUTION
TO
THE
MILLIONAIRES'
PROBLEM
BASED
ON
HOMOMORPHICENCRYPTION
.
456
HSIAO-YING
LIN
AND
WEN-GUEY
TZENG
NON-INTERACTIVE
ZERO-KNOWLEDGEARGUMENTS
FOR
VOTING
.
467
JENS
GROTH
SHORT
SIGNATURE
AND
UNIVERSAL
DESIGNATED
VERIFIER
SIGNATURE
WITHOUT
RANDOM
ORACLES
.
483
RUI
ZHANG,
JUN
FURUKAWA,
AND
HIDEKI
IMAI
EFFICIENT
IDENTITY
BASED
RING
SIGNATURE
.
499
SHERMAN
S.M.
CHOW,
SIU-MING
YIU,
AND
LUCAS
C.K.
HUI
NEW
SIGNATURE
SCHEMES
WITH
COUPONS
AND
TIGHT
REDUCTION
.
513
BENO
YY
YYT
CHEVALLIER-MAMES
AUTHOR
INDEX
.
529 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV019860953 |
callnumber-first | Q - Science |
callnumber-label | QA75 |
callnumber-raw | QA75 TK5102.85 |
callnumber-search | QA75 TK5102.85 |
callnumber-sort | QA 275 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)60613452 (DE-599)BVBBV019860953 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV019860953</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080212</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">050628s2005 gw |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">05,N23,0017</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">974911976</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540262237</subfield><subfield code="9">978-3-540-26223-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540262237</subfield><subfield code="c">: ca. EUR 68.48 (freier Pr.), ca. sfr 113.00 (freier Pr.)</subfield><subfield code="9">3-540-26223-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540262237</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11496137</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)60613452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019860953</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA75</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5102.85</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied cryptography and network security</subfield><subfield code="b">third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings</subfield><subfield code="c">John Ioannidis ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 530 S.</subfield><subfield code="c">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">3531</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">3531</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique) - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Télécommunications - Sécurité - Mesures - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2005</subfield><subfield code="z">New York, NY</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ioannidis, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACNS</subfield><subfield code="n">3</subfield><subfield code="d">2005</subfield><subfield code="c">New York, NY</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10105815-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">3531</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">3531</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=2632146&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013185459&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013185459</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2005 New York, NY gnd-content |
genre_facet | Konferenzschrift 2005 New York, NY |
id | DE-604.BV019860953 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:08:01Z |
institution | BVB |
institution_GND | (DE-588)10105815-9 |
isbn | 9783540262237 3540262237 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013185459 |
oclc_num | 60613452 |
open_access_boolean | |
owner | DE-739 DE-91G DE-BY-TUM DE-824 DE-706 DE-83 DE-11 |
owner_facet | DE-739 DE-91G DE-BY-TUM DE-824 DE-706 DE-83 DE-11 |
physical | XI, 530 S. Ill., graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings John Ioannidis ... (eds.) Berlin [u.a.] Springer 2005 XI, 530 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 3531 3531 Chiffrement (Informatique) - Congrès Cryptographie - Congrès Télécommunications - Sécurité - Mesures - Congrès Cryptography Congresses Data encryption (Computer science) Congresses Telecommunication Security measures Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2005 New York, NY gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Rechnernetz (DE-588)4070085-9 s Kryptosystem (DE-588)4209132-9 s Authentifikation (DE-588)4330656-1 s Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Ioannidis, John Sonstige oth ACNS 3 2005 New York, NY Sonstige (DE-588)10105815-9 oth Lecture Notes in Computer Science 3531 (DE-604)BV000000607 3531 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=2632146&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013185459&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings Lecture Notes in Computer Science Chiffrement (Informatique) - Congrès Cryptographie - Congrès Télécommunications - Sécurité - Mesures - Congrès Cryptography Congresses Data encryption (Computer science) Congresses Telecommunication Security measures Congresses Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4070085-9 (DE-588)4308416-3 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings |
title_auth | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings |
title_exact_search | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings |
title_full | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings John Ioannidis ... (eds.) |
title_fullStr | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings John Ioannidis ... (eds.) |
title_full_unstemmed | Applied cryptography and network security third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings John Ioannidis ... (eds.) |
title_short | Applied cryptography and network security |
title_sort | applied cryptography and network security third international conference acns 2005 new york ny usa june 7 10 2005 proceedings |
title_sub | third International Conference, ACNS 2005, New York, NY, USA, June 7 - 10, 2005 ; proceedings |
topic | Chiffrement (Informatique) - Congrès Cryptographie - Congrès Télécommunications - Sécurité - Mesures - Congrès Cryptography Congresses Data encryption (Computer science) Congresses Telecommunication Security measures Congresses Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Chiffrement (Informatique) - Congrès Cryptographie - Congrès Télécommunications - Sécurité - Mesures - Congrès Cryptography Congresses Data encryption (Computer science) Congresses Telecommunication Security measures Congresses Datensicherung Authentifikation Rechnernetz Internet Kryptosystem Computersicherheit Kryptologie Konferenzschrift 2005 New York, NY |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=2632146&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013185459&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT ioannidisjohn appliedcryptographyandnetworksecuritythirdinternationalconferenceacns2005newyorknyusajune7102005proceedings AT acnsnewyorkny appliedcryptographyandnetworksecuritythirdinternationalconferenceacns2005newyorknyusajune7102005proceedings |