Cryptology and network security: 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6467 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 353 S. graph. Darst. 24 cm |
ISBN: | 9783642176180 3642176186 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036852752 | ||
003 | DE-604 | ||
005 | 20110121 | ||
007 | t| | ||
008 | 101206s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N45 |2 dnb | ||
015 | |a 10,A49 |2 dnb | ||
016 | 7 | |a 1008091421 |2 DE-101 | |
020 | |a 9783642176180 |c kart. : EUR 57.78 (DE) (freier Pr.), sfr 77.50 (freier Pr.) |9 978-3-642-17618-0 | ||
020 | |a 3642176186 |9 3-642-17618-6 | ||
024 | 3 | |a 9783642176180 | |
028 | 5 | 2 | |a Best.-Nr.: 80028824 |
035 | |a (OCoLC)698595561 | ||
035 | |a (DE-599)DNB1008091421 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Cryptology and network security |b 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings |c Swee-Huay Heng ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIII, 353 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6467 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Kuala Lumpur |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Heng, Swee-Huay |e Sonstige |0 (DE-588)142493740 |4 oth | |
711 | 2 | |a CANS |n 9 |d 2010 |c Kuala Lumpur |j Sonstige |0 (DE-588)16092088-7 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6467 |w (DE-604)BV000000607 |9 6467 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3557254&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020768678&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020768678 |
Datensatz im Suchindex
_version_ | 1820875284456407040 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
BLOCK CIPHERS CRYPTANALYSIS OF REDUCED-ROUND MIBS BLOCK CIPHER 1
ASLI BAY, JORGE NAKAHARA JR., AND SERGE VAUDENAY
I M P O S S I B LE DIFFERENTIAL C R Y P T A N A L Y S IS OF A R IA R E D
U C ED TO 7 R O U N DS . . 20
CHENGHANG DU AND JIAZHE CHEN
AN ALGORITHM BASED CONCURRENT ERROR DETECTION SCHEME FOR AES 31 CHANG N.
ZHANG, QIAN YU, AND XIAO WEI LIU
INVITED TALK I
CRYPTOGRAPHY FOR UNCONDITIONALLY SECURE MESSAGE TRANSMISSION IN NETWORKS
(ABSTRACT) 43
KAORU KUROSAWA
WIRELESS NETWORK SECURITY
PERFORMANCE AND SECURITY ASPECTS OF CLIENT-SIDE SSL/TLS PROCESSING ON
MOBILE DEVICES 44
JOHANN GROSSSCHAEDL AND ILYA KIZHVATOV
A PRACTICAL CRYPTOGRAPHIC DENIAL OF SERVICE ATTACK AGAINST 802.HI TKIP
AND CCMP 62
MARTIN EIAN
USER TRACKING BASED ON BEHAVIORAL FINGERPRINTS 76
GUENTHER LACKNER, PETER TEUFL, AND ROMAN WEINBERGER
HASH FUNCTIONS
ON THE COLLISION AND PREIMAGE RESISTANCE OF CERTAIN TWO-CALL HASH
FUNCTIONS 96
NASOUR BAGHERI, PRAVEEN GAURAVARAM, MAJID NADERI, AND SOREN S. THOMSEN
INTEGRAL DISTINGUISHERS OF SOME SHA-3 CANDIDATES 106
MARINE MINIER, RAPHAEL C.-W. PHAN, AND BENJAMIN POUSSE
NEAR-COLLISIONS ON THE REDUCED-ROUND COMPRESSION FUNCTIONS OF SKEIN AND
BLAKE 124
BOZHAN SU, WENLING WU, SHUANG WU, AND LE DONG
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1008091421
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
PUBLIC KEY CRYPTOGRAPHY
P R A C T I C AL A L G E B R A IC C R Y P T A N A L Y S IS FOR D R A G O
N - B A S ED C R Y P T O S Y S T E MS . . . 140
JOHANNES BUCHMANN, STANISLAV BULYGIN, JINTAI DING, WAEL SAID ABD
ELMAGEED MOHAMED, AND FABIAN WERNER
GENERATING PARAMETERS FOR ALGEBRAIC TORUS-BASED CRYPTOSYSTEMS 156 TOMOKO
YONEMURA, YOSHIKAZU HANATANI, TAICHI ISOGAI, KENJI OHKUMA, AND HIROFUMI
MURATANI
ANALYSIS OF THE MQQ PUBLIC KEY CRYPTOSYSTEM 169
JEAN-CHARLES FAUGERE, RUNE STEINSMO 0DEGARD, LUDOVIC PERRET, AND DANILO
GLIGOROSKI
EFFICIENT SCALAR MULTIPLICATIONS FOR ELLIPTIC CURVE CRYPTOSYSTEMS USING
MIXED COORDINATES STRATEGY AND DIRECT COMPUTATIONS 184
ROGHAIE MAHDAVI AND ABOLGHASEM SAIADIAN
INVITED TALK II
CRYPTOGRAPHY MEETS HARDWARE: SELECTED TOPICS OF HARDWARE-BASED
CRYPTOGRAPHY (ABSTRACT) 199
AHMAD-REZA SADEGHI
SECURE MECHANISMS
TOWARDS A CRYPTOGRAPHIC TREATMENT OF PUBLISH/SUBSCRIBE SYSTEMS 201 TSZ
HON YUEN, WILLY SUSILO, AND YI MU
STE3D-CAP: STEREOSCOPIC 3D CAPTCHA 221
WILLY SUSILO, YANG- WAI CHOW, AND HUA- YU ZHOU
TRIOB: A TRUSTED VIRTUAL COMPUTING ENVIRONMENT BASED ON REMOTE I/O
BINDING MECHANISM 241
HAIFENG FANG, HUI WANG, YIQIANG ZHAO, YUZHONG SUN, AND ZHIYONG LIU
CRYPTOGRAPHIC PROTOCOLS
DYNAMIC GROUP KEY EXCHANGE REVISITED 261
GUOMIN YANG AND CHIK HOW TAN
TOWARDS PRACTICAL AND SECURE COERCION-RESISTANT ELECTRONIC ELECTIONS 278
ROBERTO ARAUJO, NARJES BEN RAJEB, RIADH ROBBANA, JACQUES TRAORE, AND
SOUHEIB YOUSFI
IMAGE 3
TABLE OF CONTENTS XIII
ANONYMOUS CREDENTIALS
PREDICATE ENCRYPTION WITH PARTIAL PUBLIC KEYS 298
CARLO BLUNDO, VINCENZO IOVINO, AND GIUSEPPE PERSIANO
ANONYMOUS CREDENTIAL SCHEMES WITH ENCRYPTED ATTRIBUTES 314 JORGE
GUAJARDO, BART MENNINK, AND BERRY SCHOENMAKERS
ONE TIME ANONYMOUS CERTIFICATE: X.509 SUPPORTING ANONYMITY 334 AYMEN
ABED AND SEBASTIEN CANARD
AUTHOR INDEX 355 |
any_adam_object | 1 |
author_GND | (DE-588)142493740 |
building | Verbundindex |
bvnumber | BV036852752 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)698595561 (DE-599)DNB1008091421 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036852752</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110121</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101206s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N45</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,A49</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1008091421</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642176180</subfield><subfield code="c">kart. : EUR 57.78 (DE) (freier Pr.), sfr 77.50 (freier Pr.)</subfield><subfield code="9">978-3-642-17618-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642176186</subfield><subfield code="9">3-642-17618-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642176180</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80028824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)698595561</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1008091421</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings</subfield><subfield code="c">Swee-Huay Heng ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 353 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6467</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Kuala Lumpur</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heng, Swee-Huay</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)142493740</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">9</subfield><subfield code="d">2010</subfield><subfield code="c">Kuala Lumpur</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16092088-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6467</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6467</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3557254&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020768678&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020768678</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Kuala Lumpur gnd-content |
genre_facet | Konferenzschrift 2010 Kuala Lumpur |
id | DE-604.BV036852752 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:11Z |
institution | BVB |
institution_GND | (DE-588)16092088-7 |
isbn | 9783642176180 3642176186 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020768678 |
oclc_num | 698595561 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XIII, 353 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings Swee-Huay Heng ... (ed.) Berlin [u.a.] Springer 2010 XIII, 353 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6467 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Kuala Lumpur gnd-content Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Hash-Algorithmus (DE-588)4323071-4 s Heng, Swee-Huay Sonstige (DE-588)142493740 oth CANS 9 2010 Kuala Lumpur Sonstige (DE-588)16092088-7 oth Lecture notes in computer science 6467 (DE-604)BV000000607 6467 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3557254&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020768678&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4323071-4 (DE-588)1071861417 |
title | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings |
title_auth | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings |
title_exact_search | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings |
title_full | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings Swee-Huay Heng ... (ed.) |
title_fullStr | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings Swee-Huay Heng ... (ed.) |
title_full_unstemmed | Cryptology and network security 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings Swee-Huay Heng ... (ed.) |
title_short | Cryptology and network security |
title_sort | cryptology and network security 9th international conference cans 2010 kuala lumpur malaysia december 12 14 2010 proceedings |
title_sub | 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12 - 14, 2010 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
topic_facet | Datensicherung Rechnernetz Kryptoanalyse Kryptosystem Computersicherheit Hash-Algorithmus Konferenzschrift 2010 Kuala Lumpur |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3557254&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020768678&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT hengsweehuay cryptologyandnetworksecurity9thinternationalconferencecans2010kualalumpurmalaysiadecember12142010proceedings AT canskualalumpur cryptologyandnetworksecurity9thinternationalconferencecans2010kualalumpurmalaysiadecember12142010proceedings |