Cryptology and network security: 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture notes in computer science
5339 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 394 S. graph. Darst. 24 cm |
ISBN: | 9783540896401 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035180023 | ||
003 | DE-604 | ||
005 | 20090115 | ||
007 | t| | ||
008 | 081125s2008 xx d||| |||| 10||| eng d | ||
015 | |a 08,N48,0010 |2 dnb | ||
016 | 7 | |a 991139674 |2 DE-101 | |
020 | |a 9783540896401 |c kart. : EUR 60.94 (freier Pr.), sfr 95.00 (freier Pr.) |9 978-3-540-89640-1 | ||
024 | 3 | |a 9783540896401 | |
028 | 5 | 2 | |a 12577507 |
035 | |a (OCoLC)276332272 | ||
035 | |a (DE-599)DNB991139674 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Cryptology and network security |b 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings |c Matthew K. Franklin ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XIII, 394 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5339 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Authentifikation - Schlüsselverwaltung - Kongress - Hongkong <2008> | |
650 | 4 | |a Elektronische Unterschrift - Kongress - Hongkong <2008> | |
650 | 4 | |a Kryptoanalyse - Kongress - Hongkong <2008> | |
650 | 4 | |a Kryptosystem - Kongress - Hongkong <2008> | |
650 | 4 | |a Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hongkong <2008> | |
650 | 4 | |a Computer networks |x Security measures |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Hongkong |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | 1 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Franklin, Matthew |e Sonstige |4 oth | |
711 | 2 | |a CANS |n 7 |d 2008 |c Hongkong |j Sonstige |0 (DE-588)10364128-2 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5339 |w (DE-604)BV000000607 |9 5339 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986796&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016986796 |
Datensatz im Suchindex
_version_ | 1820875103676661760 |
---|---|
adam_text |
TABLE OF CONTENTS CRYPTOSYSTEMS CHOSEN-CIPHERTEXT SECURE PROXY
RE-ENCRYPTION WITHOUT PAIRINGS 1 ROBERT H. DENG, MAN WENG, SHENGLI LIU,
AND KEFEI CHEN HYBRID DAMGAERD IS CCAL-SECURE UNDER THE DDH ASSUMPTION 18
YVO DESMEDT, HELGER LIPMAA, AND DUONG HIEU PHAN EFFICIENT DYNAMIC
BROADCAST ENCRYPTION AND ITS EXTENSION TO AUTHENTICATED DYNAMIC
BROADCAST ENCRYPTION 31 MASAFUMI KUSAKAWA, HARUNAGA HIWATARI, TOMOYUKI
ASANO, AND SEIICHI MATSUDA CRYPTANALYSIS OF SHORT EXPONENT RSA WITH
PRIMES SHARING LEAST SIGNIFICANT BITS 49 HUNG-MIN SUN, MU-EN WU, RON
STEINFELD, JIAN GUO, AND HUAXIONG WANG SIGNATURES EFFICIENT AND SHORT
CERTIFICATELESS SIGNATURE 64 RAYLIN TSO, XUN YI, AND XINYI HUANG
SANITIZABLE SIGNATURES REVISITED 80 TSZ HON YUEN, WILLY SUSILO, JOSEPH
K. LIU, AND YI MU AN EFFICIENT ON-LINE/OFF-LINE SIGNATURE SCHEME WITHOUT
RANDOM ORACLES : 98 MARC JOYE ON THE SECURITY OF ONLINE/OFFLINE
SIGNATURES AND MULTISIGNATURES FROM ACISP'06 108 FAGEN LI, MASAAKI
SHIRASE, AND TSUYOSHI TAKAGI IDENTIFICATION, AUTHENTICATION AND KEY
MANAGEMENT A KILLER APPLICATION FOR PAIRINGS: AUTHENTICATED KEY
ESTABLISHMENT IN UNDERWATER WIRELESS SENSOR NETWORKS 120 DAVID GALINDO,
RODRIGO ROMAN, AND JAVIER LOPEZ ANONYMOU BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/991139674 DIGITALISIERT DURCH XII TABLE OF CONTENTS
CRYPTANALYSIS OF EC-RAC, A RFID IDENTIFICATION PROTOCOL 149 JULIEN
BRINGER, HERVE CHABANNE, AND THOMAS ICART CRYPTOGRAPHIC ALGORITHMS AND
PROTOCOLS COUNTING METHOD FOR MULTI-PARTY COMPUTATION OVER NON-ABELIAN
GROUPS 162 YOUMING QIAO AND CHRISTOPHE TARTARY KEYWORD FIELD-FREE
CONJUNCTIVE KEYWORD SEARCHES ON ENCRYPTED DATA AND EXTENSION FOR DYNAMIC
GROUPS 178 PEISHUN WANG, HUAXIONG WANG, AND JOSEF PIEPRZYK ANALYSIS AND
DESIGN OF MULTIPLE THRESHOLD CHANGEABLE SECRET SHARING SCHEMES 196
TIANCHENG LOU AND CHRISTOPHE TARTARY BLACK-BOX CONSTRUCTIONS FOR
FULLY-SIMULATABLE OBLIVIOUS TRANSFER PROTOCOLS 214 HUAFEI ZHU SKEW
FROBENIUS MAP AND EFFICIENT SCALAR MULTIPLICATION FOR PAIRING-BASED
CRYPTOGRAPHY 226 YUMI SAKEMI, YASUYUKI NOGAMI, KATSUYUKI OKEYA, HIDEHIRO
KATO, AND YOSHITAKA MORIKAWA STREAM CIPHERS AND BLOCK CIPHERS
CRYPTANALYSIS OF MV3 STREAM CIPHER 240 MOHAMMAD ALI ORUMIEHCHI, S.
FAHIMEH MOHEBBIPOOR, AND HOSSEIN GHODOSI 3D: A THREE-DIMENSIONAL BLOCK
CIPHER 252 JORGE NAKAHARA JR. CRYPTOGRAPHIC FOUNDATIONS CONSTRUCTION OF
RESILIENT FUNCTIONS WITH MULTIPLE CRYPTOGRAPHIC CRITERIA 268 CHAO LI,
SHAOJING FU, AND BING SUN ENUMERATION OF HOMOGENEOUS ROTATION SYMMETRIE
FUNCTIONS OVER F TABLE OF CONTENTS XIII APPLICATIONS AND IMPLEMENTATIONS
AN OPEN FRAMEWORK FOR REMOTE ELECTRONIC ELECTIONS 304 YU ZHANG
CONDITIONAL PAYMENTS FOR COMPUTING MARKETS 317 BOGDAN CARBUNAR AND
MAHESH TRIPUNITARA HIGH-SPEED SEARCH SYSTEM FOR PGP PASSPHRASES 332
KOICHI SHIMIZU, DAISUKE SUZUKI, AND TOYOHIRO TSURUMARU WORKLOAD
CHARACTERIZATION OF A LIGHTWEIGHT SSL IMPLEMENTATION RESISTANT TO
SIDE-CHANNEL ATTACKS 349 MANUEL KOSCHUCH, JOHANN GROSSSCHAEDL, UDO PAYER,
MATTHIAS HUDLER, AND MICHAEL KRUEGER SECURITY IN AD HOC NETWORKS AND
WIRELESS SENSOR NETWORKS AUTHENTICATED DIRECTED DIFFUSION 366 ERIC K.
WANG, LUCAS C.K. HUI, AND S.M. YIU A NEW MESSAGE RECOGNITION PROTOCOL
FOR AD HOC PERVASIVE NETWORKS 378 ATEFEH MASHATAN AND DOUGLAS R. STINSON
AUTHOR INDEX 395 |
adam_txt |
TABLE OF CONTENTS CRYPTOSYSTEMS CHOSEN-CIPHERTEXT SECURE PROXY
RE-ENCRYPTION WITHOUT PAIRINGS 1 ROBERT H. DENG, MAN WENG, SHENGLI LIU,
AND KEFEI CHEN HYBRID DAMGAERD IS CCAL-SECURE UNDER THE DDH ASSUMPTION 18
YVO DESMEDT, HELGER LIPMAA, AND DUONG HIEU PHAN EFFICIENT DYNAMIC
BROADCAST ENCRYPTION AND ITS EXTENSION TO AUTHENTICATED DYNAMIC
BROADCAST ENCRYPTION 31 MASAFUMI KUSAKAWA, HARUNAGA HIWATARI, TOMOYUKI
ASANO, AND SEIICHI MATSUDA CRYPTANALYSIS OF SHORT EXPONENT RSA WITH
PRIMES SHARING LEAST SIGNIFICANT BITS 49 HUNG-MIN SUN, MU-EN WU, RON
STEINFELD, JIAN GUO, AND HUAXIONG WANG SIGNATURES EFFICIENT AND SHORT
CERTIFICATELESS SIGNATURE 64 RAYLIN TSO, XUN YI, AND XINYI HUANG
SANITIZABLE SIGNATURES REVISITED 80 TSZ HON YUEN, WILLY SUSILO, JOSEPH
K. LIU, AND YI MU AN EFFICIENT ON-LINE/OFF-LINE SIGNATURE SCHEME WITHOUT
RANDOM ORACLES : 98 MARC JOYE ON THE SECURITY OF ONLINE/OFFLINE
SIGNATURES AND MULTISIGNATURES FROM ACISP'06 108 FAGEN LI, MASAAKI
SHIRASE, AND TSUYOSHI TAKAGI IDENTIFICATION, AUTHENTICATION AND KEY
MANAGEMENT A KILLER APPLICATION FOR PAIRINGS: AUTHENTICATED KEY
ESTABLISHMENT IN UNDERWATER WIRELESS SENSOR NETWORKS 120 DAVID GALINDO,
RODRIGO ROMAN, AND JAVIER LOPEZ ANONYMOU BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/991139674 DIGITALISIERT DURCH XII TABLE OF CONTENTS
CRYPTANALYSIS OF EC-RAC, A RFID IDENTIFICATION PROTOCOL 149 JULIEN
BRINGER, HERVE CHABANNE, AND THOMAS ICART CRYPTOGRAPHIC ALGORITHMS AND
PROTOCOLS COUNTING METHOD FOR MULTI-PARTY COMPUTATION OVER NON-ABELIAN
GROUPS 162 YOUMING QIAO AND CHRISTOPHE TARTARY KEYWORD FIELD-FREE
CONJUNCTIVE KEYWORD SEARCHES ON ENCRYPTED DATA AND EXTENSION FOR DYNAMIC
GROUPS 178 PEISHUN WANG, HUAXIONG WANG, AND JOSEF PIEPRZYK ANALYSIS AND
DESIGN OF MULTIPLE THRESHOLD CHANGEABLE SECRET SHARING SCHEMES 196
TIANCHENG LOU AND CHRISTOPHE TARTARY BLACK-BOX CONSTRUCTIONS FOR
FULLY-SIMULATABLE OBLIVIOUS TRANSFER PROTOCOLS 214 HUAFEI ZHU SKEW
FROBENIUS MAP AND EFFICIENT SCALAR MULTIPLICATION FOR PAIRING-BASED
CRYPTOGRAPHY 226 YUMI SAKEMI, YASUYUKI NOGAMI, KATSUYUKI OKEYA, HIDEHIRO
KATO, AND YOSHITAKA MORIKAWA STREAM CIPHERS AND BLOCK CIPHERS
CRYPTANALYSIS OF MV3 STREAM CIPHER 240 MOHAMMAD ALI ORUMIEHCHI, S.
FAHIMEH MOHEBBIPOOR, AND HOSSEIN GHODOSI 3D: A THREE-DIMENSIONAL BLOCK
CIPHER 252 JORGE NAKAHARA JR. CRYPTOGRAPHIC FOUNDATIONS CONSTRUCTION OF
RESILIENT FUNCTIONS WITH MULTIPLE CRYPTOGRAPHIC CRITERIA 268 CHAO LI,
SHAOJING FU, AND BING SUN ENUMERATION OF HOMOGENEOUS ROTATION SYMMETRIE
FUNCTIONS OVER F TABLE OF CONTENTS XIII APPLICATIONS AND IMPLEMENTATIONS
AN OPEN FRAMEWORK FOR REMOTE ELECTRONIC ELECTIONS 304 YU ZHANG
CONDITIONAL PAYMENTS FOR COMPUTING MARKETS 317 BOGDAN CARBUNAR AND
MAHESH TRIPUNITARA HIGH-SPEED SEARCH SYSTEM FOR PGP PASSPHRASES 332
KOICHI SHIMIZU, DAISUKE SUZUKI, AND TOYOHIRO TSURUMARU WORKLOAD
CHARACTERIZATION OF A LIGHTWEIGHT SSL IMPLEMENTATION RESISTANT TO
SIDE-CHANNEL ATTACKS 349 MANUEL KOSCHUCH, JOHANN GROSSSCHAEDL, UDO PAYER,
MATTHIAS HUDLER, AND MICHAEL KRUEGER SECURITY IN AD HOC NETWORKS AND
WIRELESS SENSOR NETWORKS AUTHENTICATED DIRECTED DIFFUSION 366 ERIC K.
WANG, LUCAS C.K. HUI, AND S.M. YIU A NEW MESSAGE RECOGNITION PROTOCOL
FOR AD HOC PERVASIVE NETWORKS 378 ATEFEH MASHATAN AND DOUGLAS R. STINSON
AUTHOR INDEX 395 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV035180023 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)276332272 (DE-599)DNB991139674 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035180023</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090115</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">081125s2008 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N48,0010</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">991139674</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540896401</subfield><subfield code="c">kart. : EUR 60.94 (freier Pr.), sfr 95.00 (freier Pr.)</subfield><subfield code="9">978-3-540-89640-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540896401</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12577507</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)276332272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB991139674</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings</subfield><subfield code="c">Matthew K. Franklin ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 394 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5339</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentifikation - Schlüsselverwaltung - Kongress - Hongkong <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Elektronische Unterschrift - Kongress - Hongkong <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Hongkong <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptosystem - Kongress - Hongkong <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hongkong <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Hongkong</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Franklin, Matthew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">7</subfield><subfield code="d">2008</subfield><subfield code="c">Hongkong</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10364128-2</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5339</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5339</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986796&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016986796</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Hongkong gnd-content |
genre_facet | Konferenzschrift 2008 Hongkong |
id | DE-604.BV035180023 |
illustrated | Illustrated |
index_date | 2024-07-02T22:57:32Z |
indexdate | 2025-01-10T15:10:19Z |
institution | BVB |
institution_GND | (DE-588)10364128-2 |
isbn | 9783540896401 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016986796 |
oclc_num | 276332272 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIII, 394 S. graph. Darst. 24 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings Matthew K. Franklin ... (ed.) Berlin [u.a.] Springer 2008 XIII, 394 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5339 Literaturangaben Authentifikation - Schlüsselverwaltung - Kongress - Hongkong <2008> Elektronische Unterschrift - Kongress - Hongkong <2008> Kryptoanalyse - Kongress - Hongkong <2008> Kryptosystem - Kongress - Hongkong <2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hongkong <2008> Computer networks Security measures Congresses Cryptography Congresses Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Hongkong gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Elektronische Unterschrift (DE-588)4269037-7 s Authentifikation (DE-588)4330656-1 s Schlüsselverwaltung (DE-588)4625230-7 s Kryptoanalyse (DE-588)4830502-9 s Franklin, Matthew Sonstige oth CANS 7 2008 Hongkong Sonstige (DE-588)10364128-2 oth Lecture notes in computer science 5339 (DE-604)BV000000607 5339 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986796&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings Lecture notes in computer science Authentifikation - Schlüsselverwaltung - Kongress - Hongkong <2008> Elektronische Unterschrift - Kongress - Hongkong <2008> Kryptoanalyse - Kongress - Hongkong <2008> Kryptosystem - Kongress - Hongkong <2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hongkong <2008> Computer networks Security measures Congresses Cryptography Congresses Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4625230-7 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4330656-1 (DE-588)4269037-7 (DE-588)1071861417 |
title | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings |
title_auth | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings |
title_exact_search | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings |
title_exact_search_txtP | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings |
title_full | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings Matthew K. Franklin ... (ed.) |
title_fullStr | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings Matthew K. Franklin ... (ed.) |
title_full_unstemmed | Cryptology and network security 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings Matthew K. Franklin ... (ed.) |
title_short | Cryptology and network security |
title_sort | cryptology and network security 7th international conference cans 2008 hong kong china december 2 4 2008 proceedings |
title_sub | 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008 ; proceedings |
topic | Authentifikation - Schlüsselverwaltung - Kongress - Hongkong <2008> Elektronische Unterschrift - Kongress - Hongkong <2008> Kryptoanalyse - Kongress - Hongkong <2008> Kryptosystem - Kongress - Hongkong <2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hongkong <2008> Computer networks Security measures Congresses Cryptography Congresses Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Authentifikation (DE-588)4330656-1 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Authentifikation - Schlüsselverwaltung - Kongress - Hongkong <2008> Elektronische Unterschrift - Kongress - Hongkong <2008> Kryptoanalyse - Kongress - Hongkong <2008> Kryptosystem - Kongress - Hongkong <2008> Rechnernetz - Datensicherung - Computersicherheit - Kongress - Hongkong <2008> Computer networks Security measures Congresses Cryptography Congresses Kryptoanalyse Kryptosystem Computersicherheit Schlüsselverwaltung Datensicherung Rechnernetz Authentifikation Elektronische Unterschrift Konferenzschrift 2008 Hongkong |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986796&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT franklinmatthew cryptologyandnetworksecurity7thinternationalconferencecans2008hongkongchinadecember242008proceedings AT canshongkong cryptologyandnetworksecurity7thinternationalconferencecans2008hongkongchinadecember242008proceedings |