Information security and cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York, NY
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5487 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIII, 437 S. graph. Darst. |
ISBN: | 9783642014390 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035453889 | ||
003 | DE-604 | ||
005 | 20090603 | ||
007 | t| | ||
008 | 090427s2009 xx d||| |||| 10||| eng d | ||
016 | 7 | |a 993291651 |2 DE-101 | |
020 | |a 9783642014390 |9 978-3-642-01439-0 | ||
035 | |a (OCoLC)319496961 | ||
035 | |a (DE-599)DNB993291651 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-83 |a DE-706 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.8 |2 22//ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information security and cryptology |b 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers |c Moti Yung ... (eds.) |
264 | 1 | |a Berlin ; Heidelberg ; New York, NY |b Springer |c 2009 | |
300 | |a XIII, 437 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5487 | |
650 | 4 | |a Authentifikation - Kongress - Peking <2008> | |
650 | 4 | |a Computersicherheit - Kongress - Peking <2008> | |
650 | 4 | |a Datensicherung - Kongress - Peking <2008> | |
650 | 4 | |a Kryptoanalyse - Kongress - Peking <2008> | |
650 | 4 | |a Kryptologie - Kongress - Peking <2008> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Yung, Moti |e Sonstige |4 oth | |
711 | 2 | |a Inscrypt |n 4 |d 2008 |c Peking |j Sonstige |0 (DE-588)16178980-8 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5487 |w (DE-604)BV000000607 |9 5487 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373871&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017373871 |
Datensatz im Suchindex
_version_ | 1820875119359164416 |
---|---|
adam_text |
TABLE OF CONTENTS
INVITE
D TALKS
TH
E STAT
E OF HASH FUNCTIONS AND TH
E NIST SHA-3 COMPETITION
(EXTENDED ABSTRACT
) 1
BART PRENEEL
KEY EVOLUTION SYSTEMS IN UNTRUSTE
D UPDAT
E ENVIRONMENTS 12
BENOIT LIBERT, JEAN-JACQUES QUISQUATER, AND MOTI YUNG
SECURE AN
D PRIVACY-PRESERVING INFORMATION BROKERING 22
PENG LIU
DIGITA
L SIGNATUR
E AN
D SIGNCRYPTIO
N SCHEMES
PROVABLY SECURE CONVERTIBLE NOMINATIVE SIGNATURE SCHEME 23
WEI ZHAO, CHANGLU LIN, AND DINGFENG YE
CRYPTANALYSI
S OF TWO RING SIGNCRYPTION SCHEMES 41
HUAQUN WANG AND HONG YU
EFFICIENT SIGNCRYPTION KEY ENCAPSULATION WITHOU
T RANDOM ORACLES 47
FAGEN LI, MASAAKI SHIRASE, AND TSUYOSHI TAKAGI
PRIVAC
Y AN
D ANONYMIT
Y
STRONG ANONYMOUS SIGNATURES 60
RUT ZHANG AND HIDEKI IMAI
PUBLICLY VERIFIABLE PRIVACY-PRESERVING GROU
P DECRYPTION 72
BO QIN, QIANHONG WU, WILLY SUSILO, AND YI MU
PRIVACY FOR PRIVAT
E KEY IN SIGNATURES 84
QIANHONG WU, BO QIN, YI MU, AND WILLY SUSILO
MESSAGE AUTHENTICATIO
N COD
E AN
D HAS
H FUNCTIO
N
SECURITY OF TRUNCATE
D MACS 96
PENG WANG, DENGGUO FENG, CHANGLU LIN, AND WENLING WU
SECURITY ANALYSIS OF MULTIVARIATE POLYNOMIALS FOR HASHING 115
LUK BETTALE, JEAN-CHARLES FAUGERE, AND LUDOVIC PERRET
BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/993291651
DIGITALISIERT DURCH
XII TABLE OF CONTENTS
SECUR
E PROTOCOL
S
SPVT-II
: AN EFFICIENT SECURITY PROTOCO
L VERIFIER BASED ON LOGIC
PROGRAMMIN
G 125
MENGJUN LI, TI ZHOU, AND ZHOUJUN LI
BATC
H ZK PROOF AN
D VERIFICATION OF O
R LOGIC 141
KUN PENG AND FENG BAO
SYMMETRI
C CRYPTOGRAPH
Y
CONSTRUCTIN
G VARIABLE-LENGTH PRP
S AN
D SPRP
S FROM FIXED-LENGTH
PRP
S 157
DEBRA L. COOK, MOTI YUNG, AND ANGELOS KEROMYTIS
IMPOSSIBLE DIFFERENTIAL ANALYSIS OF REDUCED ROUND CLEFI
A 181
WENYING ZHANG AND JING HAN
REDUCIBLE POLYNOMIAL OVER F2 CONSTRUCTE
D BY TRINOMIAL
A-
LFSR 192
GUANG ZENG, YANG YANG, WENBAO HAN, AND SHUQIN FAN
CERTIFICATELES
S CRYPTOGRAPH
Y
CHOSEN CIPHERTEX
T SECURE CERTIFICATELESS THRESHOLD ENCRYPTIO
N IN TH
E
STANDAR
D MODEL 201
PIYI YANG, ZHENFU CAO, AND XIAOLEI DONG
FURTHE
R OBSERVATIONS ON CERTIFICATELESS PUBLI
C KEY ENCRYPTIO
N 217
XU AN WANG, XINYI HUANG, AND XIAOYUAN YANG
HARDWAR
E IMPLEMENTATIO
N AN
D SIDE CHANNE
L ATTAC
K
EFFICIENT HARDWARE ARCHITECTUR
E OF SHA-256 ALGORITHM FOR TRUSTE
D
MOBILE COMPUTIN
G 240
MOOSEOP KIRN, JAECHEOL RYOU, AND SUNGIK JUN
NEW ELLIPTIC CURVE MULTI-SCALAR MULTIPLICATION ALGORITHM FOR A PAI
R OF
INTEGERS T
O RESIST SPA 253
DUO LIU, ZHIYONG TAN, AND YIQI DAI
WIRELES
S NETWOR
K SECURIT
Y
A NOVEL MARKING PROBABILIT
Y DISTRIBUTIO
N USING PROBABILIT
Y
PROPAGATIO
N IN HIERARCHICAL WSN 265
BO-CHAO CHENG, HUAN CHEN, AND GUO-TAN LIAO
TABLE OF CONTENTS XIII
KEY PREDISTRIBUTIO
N SCHEMES USING CODES IN WIRELESS SENSOR
NETWORKS 275
SUSHMITA RUJ AND BIMAL ROY
EFFICIENT MULTI-PKG ID-BASED SIGNCRYPTION FOR AD HOC NETWORKS 289
FAGEN LI, MASAAKI SHIRASE, AND TSUYOSHI TAKAGI
PUBLI
C KE
Y AN
D IDENTIT
Y BASE
D CRYPTOGRAPH
Y
ON TH
E COMPUTATIONA
L EFFICIENCY OF XTR
+ 305
NINGBO MU, YUPU HU, AND LEYOU ZHANG
A VARIANT OF BONEH-GENTRY-HAMBURG'S PAIRING-FREE IDENTIT
Y BASED
ENCRYPTIO
N SCHEME 314
MAHABIR PRASAD JHANWAR AND RANA BARUA
INTER-DOMAIN IDENTITY-BASED PROX
Y RE-ENCRYPTION 332
QIANG TANG, PIETER HARTEL, AND WILLEM JONKER
ACCESS CONTRO
L AN
D NETWOR
K SECURIT
Y
HARDENING BOTNE
T BY A RATIONAL BOTMASTE
R 348
ZONGHUA ZHANG, RUO ANDO, AND YOUKI KADOBAYASHI
SEPARATION OF DUT
Y IN TRUST-BASED COLLABORATION 370
LINGLI DENG, YEPING HE, AND ZIYAO XU
TRUSTE
D COMPUTIN
G AN
D APPLICATION
S
AN INTEGRIT
Y ASSURANCE MECHANISM FOR RUN-TIM
E PROGRAM
S 389
ZIYAO XU, YEPING HE, AND LINGLI DENG
A SECURITY AND PERFORMANCE EVALUATION OF HASH-BASED RFID
PROTOCOLS 406
TONG-LEE LIM, TIEYAN LI, AND YINGJIU LI
CORRECTION, OPTIMISATION AND SECURE AND EFFICIENT APPLICATION OF PB
D
SHUFFLING 425
KUN PENG AND FENG BAO
AUTHOR INDEX
439 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035453889 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)319496961 (DE-599)DNB993291651 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035453889</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090603</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090427s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">993291651</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642014390</subfield><subfield code="9">978-3-642-01439-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)319496961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB993291651</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and cryptology</subfield><subfield code="b">4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers</subfield><subfield code="c">Moti Yung ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 437 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5487</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authentifikation - Kongress - Peking <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit - Kongress - Peking <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datensicherung - Kongress - Peking <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Peking <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Kongress - Peking <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yung, Moti</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Inscrypt</subfield><subfield code="n">4</subfield><subfield code="d">2008</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16178980-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5487</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5487</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373871&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017373871</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Peking gnd-content |
genre_facet | Konferenzschrift 2008 Peking |
id | DE-604.BV035453889 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:10:33Z |
institution | BVB |
institution_GND | (DE-588)16178980-8 |
isbn | 9783642014390 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017373871 |
oclc_num | 319496961 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-83 DE-706 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-83 DE-706 DE-11 |
physical | XIII, 437 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers Moti Yung ... (eds.) Berlin ; Heidelberg ; New York, NY Springer 2009 XIII, 437 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5487 Authentifikation - Kongress - Peking <2008> Computersicherheit - Kongress - Peking <2008> Datensicherung - Kongress - Peking <2008> Kryptoanalyse - Kongress - Peking <2008> Kryptologie - Kongress - Peking <2008> Computer security Congresses Cryptography Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Peking gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Datensicherung (DE-588)4011144-1 s Authentifikation (DE-588)4330656-1 s Computersicherheit (DE-588)4274324-2 s Yung, Moti Sonstige oth Inscrypt 4 2008 Peking Sonstige (DE-588)16178980-8 oth Lecture notes in computer science 5487 (DE-604)BV000000607 5487 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373871&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers Lecture notes in computer science Authentifikation - Kongress - Peking <2008> Computersicherheit - Kongress - Peking <2008> Datensicherung - Kongress - Peking <2008> Kryptoanalyse - Kongress - Peking <2008> Kryptologie - Kongress - Peking <2008> Computer security Congresses Cryptography Congresses Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4330656-1 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers |
title_auth | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers |
title_exact_search | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers |
title_full | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers Moti Yung ... (eds.) |
title_fullStr | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers Moti Yung ... (eds.) |
title_full_unstemmed | Information security and cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers Moti Yung ... (eds.) |
title_short | Information security and cryptology |
title_sort | information security and cryptology 4th international conference inscrypt 2008 beijing china december 14 17 2008 revised selected papers |
title_sub | 4th International Conference, Inscrypt 2008, Beijing, China, December 14 - 17, 2008 ; revised selected papers |
topic | Authentifikation - Kongress - Peking <2008> Computersicherheit - Kongress - Peking <2008> Datensicherung - Kongress - Peking <2008> Kryptoanalyse - Kongress - Peking <2008> Kryptologie - Kongress - Peking <2008> Computer security Congresses Cryptography Congresses Datensicherung (DE-588)4011144-1 gnd Authentifikation (DE-588)4330656-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Authentifikation - Kongress - Peking <2008> Computersicherheit - Kongress - Peking <2008> Datensicherung - Kongress - Peking <2008> Kryptoanalyse - Kongress - Peking <2008> Kryptologie - Kongress - Peking <2008> Computer security Congresses Cryptography Congresses Datensicherung Authentifikation Kryptoanalyse Computersicherheit Kryptologie Konferenzschrift 2008 Peking |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017373871&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT yungmoti informationsecurityandcryptology4thinternationalconferenceinscrypt2008beijingchinadecember14172008revisedselectedpapers AT inscryptpeking informationsecurityandcryptology4thinternationalconferenceinscrypt2008beijingchinadecember14172008revisedselectedpapers |