Security protocols: 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
5964 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | IX, 255 S. graph. Darst. 24 cm |
ISBN: | 9783642177729 3642177727 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036964505 | ||
003 | DE-604 | ||
005 | 20150113 | ||
007 | t| | ||
008 | 110118s2010 xx d||| |||| 10||| eng d | ||
015 | |a 11,N03 |2 dnb | ||
016 | 7 | |a 1009481169 |2 DE-101 | |
020 | |a 9783642177729 |c kart. : EUR 49.22 (DE) (freier Pr.), sfr 66.00 (freier Pr.) |9 978-3-642-17772-9 | ||
020 | |a 3642177727 |9 3-642-17772-7 | ||
024 | 3 | |a 9783642177729 | |
028 | 5 | 2 | |a Best.-Nr.: 80029502 |
035 | |a (OCoLC)700053131 | ||
035 | |a (DE-599)DNB1009481169 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-11 |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 252f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Security protocols |b 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers |c Bruce Christianson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a IX, 255 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5964 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2007 |z Brünn |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |D s |
689 | 3 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Christianson, Bruce |d 1958- |e Sonstige |0 (DE-588)1064909507 |4 oth | |
711 | 2 | |a International Workshop on Security Protocols |n 15 |d 2007 |c Brünn |j Sonstige |0 (DE-588)16096524-X |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5964 |w (DE-604)BV000000607 |9 5964 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3607985&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020879335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020879335 |
Datensatz im Suchindex
_version_ | 1820875288207163392 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
WHEN IS A PROTOCOL BROKEN? (TRANSCRIPT OF DISCUSSION) 1
BRUCE CHRISTIANSEN
MEASURABLE SECURITY THROUGH ISOTROPIE CHANNELS 3
MICAH SHERR, ERIC CRONIN, AND MATT BLAZE
MEASURABLE SECURITY THROUGH ISOTROPIE CHANNELS (TRANSCRIPT OF
DISCUSSION) 13
MICAH SHERR
MODELING PARTIAL ATTACKS WITH ALLOY 20
AMERSON LIN, MIKE BOND, AND JOLYON CLULOW
MODELING PARTIAL ATTACKS WITH ALLOY (TRANSCRIPT OF DISCUSSION) 34
AMERSON LIN
RESILIENCY ASPECTS OF SECURITY PROTOCOLS 37
MARCUS C. GRANADO
PRIVACY AMPLIFICATION WITH SOCIAL NETWORKS 58
SHISHIR NAGARAJA
PRIVACY AMPLIFICATION WITH SOCIAL NETWORKS (TRANSCRIPT OF DISCUSSION) 74
SHISHIR NAGARAJA
RECONCILING MULTIPLE IPSEC AND FIREWALL POLICIES 81
TUOMAS AURA, MORITZ BECKER, MICHAEL ROE, AND PIOTR ZIELIRISKI
RECONCILING MULTIPLE IPSEC AND FIREWALL POLICIES (TRANSCRIPT OF
DISCUSSION) 98
MICHAEL ROE
ANCHOR-LESS SECURE SESSION MOBILITY 104
ALF ZUGENMAIER, JULIEN LAGANIER, ANAND PRASAD, AND KRISTIAN SLAVOV
ANCHOR-LESS SECURE SESSION MOBILITY (TRANSCRIPT OF DISCUSSION) 110 ALF
ZUGENMAIER
A MODEL FOR SYSTEM-BASED ANALYSIS OF VOTING SYSTEMS 114
THOMAS TJOESTHEIM, THEA PEACOCK, AND PETER Y.A. RYAN
A MODEL FOR SYSTEM-BASED ANALYSIS OF VOTING SYSTEMS (TRANSCRIPT OF
DISCUSSION) 131
THOMAS TJOESTHEIM
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1009481169
DIGITALISIERT DURCH
IMAGE 2
VIII TABLE OF CONTENTS
MULTI-CHANNEL KEY AGREEMENT USING ENCRYPTED PUBLIC KEY EXCHANGE 133
BRUCE CHRISTIANSON AND JUN LI
MULTI-CHANNEL KEY AGREEMENT USING ENCRYPTED PUBLIC KEY EXCHANGE
(TRANSCRIPT OF DISCUSSION) 139
BRUCE CHRISTIANSON
ON THE SECURITY OF THE EMV SECURE MESSAGING API (EXTENDED ABSTRACT) 147
BEN ADIDA, MIKE BOND, JOLYON CLULOW, AMERSON LIN, ROSS ANDERSON, AND
RONALD L. RIVEST
ON THE SECURITY OF THE EMV SECURE MESSAGING API (TRANSCRIPT OF
DISCUSSION) 150
JOLYON CLULOW
DISTRIBUTED DOUBLE SPENDING PREVENTION 152
JAAP-HENK HOEPMAN
D I S T R I B U T ED D O U B LE S P E N D I NG P R E V E N T I ON ( T R
A N S C R I PT OF D I S C U S S I O N) . . . 166
JAAP-HENK HOEPMAN
ROBBING THE BANK WITH A THEOREM PROVER (ABSTRACT) 171
PAUL YOUN, BEN ADIDA, MIKE BOND, JOLYON CLULOW, JONATHAN HERZOG, AMERSON
LIN, RONALD L. RIVEST, AND ROSS ANDERSON
ROBBING THE BANK WITH A THEOREM PROVER (TRANSCRIPT OF DISCUSSION) . .
172 JOLYON CLULOW
DISCLOSURE CONTROL OF NATURAL LANGUAGE INFORMATION TO ENABLE SECURE AND
ENJOYABLE COMMUNICATION OVER THE INTERNET 178
HARUNO KATAOKA, AKIRA UTSUMI, YUKI HIROSE, AND HIROSHI YOSHIURA
DISCLOSURE CONTROL OF NATURAL LANGUAGE INFORMATION TO ENABLE SECURE AND
ENJOYABLE COMMUNICATION OVER THE INTERNET (TRANSCRIPT OF DISCUSSION) 189
HIROSHI YOSHIURA
TOWARDS WORKING WITH SMALL ATOMIC FUNCTIONS 191
ALEE YASINSAC AND J. TODD MCDONALD
TOWARDS WORKING WITH SMALL ATOMIC FUNCTIONS (TRANSCRIPT OF DISCUSSION)
201
ALEE YASINSAC
DAONITY: PROTOCOL SOLUTIONS TO GRID SECURITY USING HARDWARE STRENGTHENED
SOFTWARE ENVIRONMENT 204
WENBO MAO, FEI YAN, CHUANJIANG YI, AND HAIBO CHEN
IMAGE 3
TABLE OF CONTENTS IX
PRIVATE YET ABUSE RESISTANT OPEN PUBLISHING 222
GEORGE DANEZIS AND BEN LAURIE
PRIVATE YET ABUSE RESISTANT OPEN PUBLISHING (TRANSCRIPT OF DISCUSSION)
244
GEORGE DANEZIS
INSTRUCTIONS TO REVIEWERS 256
AUTHOR INDEX 257 |
any_adam_object | 1 |
author_GND | (DE-588)1064909507 |
building | Verbundindex |
bvnumber | BV036964505 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 252f DAT 465f |
ctrlnum | (OCoLC)700053131 (DE-599)DNB1009481169 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036964505</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110118s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N03</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1009481169</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642177729</subfield><subfield code="c">kart. : EUR 49.22 (DE) (freier Pr.), sfr 66.00 (freier Pr.)</subfield><subfield code="9">978-3-642-17772-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642177727</subfield><subfield code="9">3-642-17772-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642177729</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80029502</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)700053131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1009481169</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols</subfield><subfield code="b">15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers</subfield><subfield code="c">Bruce Christianson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 255 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5964</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2007</subfield><subfield code="z">Brünn</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security Protocols</subfield><subfield code="n">15</subfield><subfield code="d">2007</subfield><subfield code="c">Brünn</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16096524-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5964</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5964</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3607985&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020879335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020879335</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2007 Brünn gnd-content |
genre_facet | Konferenzschrift 2007 Brünn |
id | DE-604.BV036964505 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:15Z |
institution | BVB |
institution_GND | (DE-588)16096524-X |
isbn | 9783642177729 3642177727 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020879335 |
oclc_num | 700053131 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 DE-83 |
physical | IX, 255 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers Bruce Christianson ... (eds.) Berlin [u.a.] Springer 2010 IX, 255 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5964 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Computerunterstützte Kommunikation (DE-588)4535905-2 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2007 Brünn gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Sicherheitsprotokoll (DE-588)4709127-7 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Computerunterstützte Kommunikation (DE-588)4535905-2 s Privatsphäre (DE-588)4123980-5 s Christianson, Bruce 1958- Sonstige (DE-588)1064909507 oth International Workshop on Security Protocols 15 2007 Brünn Sonstige (DE-588)16096524-X oth Lecture notes in computer science 5964 (DE-604)BV000000607 5964 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3607985&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020879335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Privatsphäre (DE-588)4123980-5 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4535905-2 (DE-588)4123980-5 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers |
title_auth | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers |
title_exact_search | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers |
title_full | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers Bruce Christianson ... (eds.) |
title_fullStr | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers Bruce Christianson ... (eds.) |
title_full_unstemmed | Security protocols 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers Bruce Christianson ... (eds.) |
title_short | Security protocols |
title_sort | security protocols 15th international workshop brno czech republic april 18 20 2007 revised selected papers |
title_sub | 15th international workshop, Brno, Czech Republic, April 18 - 20, 2007 ; revised selected papers |
topic | Datensicherung (DE-588)4011144-1 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Privatsphäre (DE-588)4123980-5 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Datensicherung Computerunterstützte Kommunikation Privatsphäre Computersicherheit Kryptologie Sicherheitsprotokoll Konferenzschrift 2007 Brünn |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3607985&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020879335&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT christiansonbruce securityprotocols15thinternationalworkshopbrnoczechrepublicapril18202007revisedselectedpapers AT internationalworkshoponsecurityprotocolsbrunn securityprotocols15thinternationalworkshopbrnoczechrepublicapril18202007revisedselectedpapers |