Applied cryptography and network security: 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
6715 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIII, 552 S. graph. Darst. 24 cm |
ISBN: | 9783642215537 364221553X |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039102420 | ||
003 | DE-604 | ||
005 | 20110816 | ||
007 | t| | ||
008 | 110627s2011 xx d||| |||| 10||| eng d | ||
015 | |a 11,N19 |2 dnb | ||
015 | |a 11,A25 |2 dnb | ||
016 | 7 | |a 1011530392 |2 DE-101 | |
020 | |a 9783642215537 |c kart. : EUR 74.90 (DE) (freier Pr.), ca. sfr 100.50 (freier Pr.) |9 978-3-642-21553-7 | ||
020 | |a 364221553X |9 3-642-21553-X | ||
024 | 3 | |a 9783642215537 | |
028 | 5 | 2 | |a Best.-Nr.: 80064296 |
035 | |a (OCoLC)725282473 | ||
035 | |a (DE-599)DNB1011530392 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-739 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Applied cryptography and network security |b 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings |c Javier Lopez ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIII, 552 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6715 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Nerja |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Lopez, Javier |e Sonstige |4 oth | |
711 | 2 | |a ACNS |n 9 |d 2011 |c Nerja |j Sonstige |0 (DE-588)16160226-5 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Applied Cryptography and Network Security |
830 | 0 | |a Lecture notes in computer science |v 6715 |w (DE-604)BV000000607 |9 6715 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3766167&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022646326&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-022646326 |
Datensatz im Suchindex
_version_ | 1820875322754596864 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
SESSION 1: MALWARE AND INTRUSION DETECTION
INFERRING PROTOCOL STATE MACHINE FROM NETWORK TRACES: A PROBABILISTIC
APPROACH 1
YIPENG WANG, ZHIBIN ZHANG, DANFENG (DAPHNE) YAO, BUYUN QU, AND LI GUO
A SPECIFICATION BASED INTRUSION DETECTION FRAMEWORK FOR MOBILE PHONES 19
ASHWIN CHAUGULE, ZHI XU, AND SENCUN ZHU
MISUSE DETECTION IN CONSENT-BASED NETWORKS 38
MANSOOR ALICHERRY AND ANGELOS D. KEROMYTIS
SESSION 2: ATTACKS I
COLD BOOT KEY RECOVERY BY SOLVING POLYNOMIAL SYSTEMS WITH N O I S E . .
. 57 MARTIN ALBRECHT AND CARLOS CID
EXPONENT BLINDING DOES NOT ALWAYS LIFT (PARTIAL) SPA RESISTANCE TO
HIGHER-LEVEL SECURITY 73
WERNER SCHINDLER AND KOUICHI ITOH
CRYPTANALYSIS OF THE ATMEL CIPHER IN SECUREMEMORY, CRYPTOMEMORY AND
CRYPTORF 91
ALEX BIRYUKOV, ILYA KIZHVATOV, AND BIN ZHANG
CACHE TIMING ANALYSIS OF RC4 110
THOMAS CHARDIN, PIERRE-ALAIN FOUQUE, AND DELPHINE LERESTEUX
SESSION 3: APPLIED CRYPTO I
SECURE EFFICIENT MULTIPARTY COMPUTING OF MULTIVARIATE POLYNOMIALS AND
APPLICATIONS 130
DANA DACHMAN-SOLED, TAL MALKIN, MARIANA RAYKOVA, AND MOTI YUNG
PRIVATE DISCOVERY OF COMMON SOCIAL CONTACTS 147
EMILIANO DE CRISTOFARO, MARK MANULIS, AND BERTRAM POETTERING
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1011530392
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
SESSION 4: SIGNATURES AND FRIENDS
SANITIZABLE SIGNATURES IN XML SIGNATURE - PERFORMANCE, MIXING
PROPERTIES, AND REVISITING THE PROPERTY OF TRANSPARENCY 166
HENRICH C. POHLS, KAI SAMELIN, AND JOACHIM POSEGGA
DOUBLE-TRAPDOOR ANONYMOUS TAGS FOR TRACEABLE SIGNATURES 183 MASAYUKI
ABE, SHERMAN S.M. CHOW, KRISTIYAN HARALAMBIEV, AND MIYAKO OHKUBO
HIERARCHICAL IDENTITY-BASED CHAMELEON HASH AND ITS APPLICATIONS 201 FENG
BAO, ROBERT H. DENG, XUHUA DING, JUNZUO LAI, AND YUNLEI ZHAO
SESSION 5: ECLECTIC ASSORTMENT
EFFICIENT GENERIC CONSTRUCTIONS OF SIGNCRYPTION WITH INSIDER SECURITY IN
THE MULTI-USER SETTING 220
DAIKI CHIBA, TAKAHIRO MATSUDA, JACOB C.N. SCHULDT, AND KANTA MATSUURA
QUANTITATIVELY ANALYZING STEALTHY COMMUNICATION CHANNELS 238 PATRICK
BUTLER, KUI XU, AND DANFENG (DAPHNE) YAO
FULLY NON-INTERACTIVE ONION ROUTING WITH FORWARD-SECRECY 255 DARIO
CATALANO, MARIO DI RAIMONDO, DARIO FIORE, ROSARIO GENNARO, AND ORAZIO
PUGLISI
SESSION 6: THEORY
GENERIC FULLY SIMULATABLE ADAPTIVE OBLIVIOUS TRANSFER 274
KAORU KUROSAWA, RYO NOJIMA, AND LE TRIEU PHONG
SIMPLE AND EFFICIENT SINGLE ROUND ALMOST PERFECTLY SECURE MESSAGE
TRANSMISSION TOLERATING GENERALIZED ADVERSARY 292
ASHISH CHOUDHURY, KAORU KUROSAWA, AND ARPITA PATRA
RELAXED SECURITY NOTIONS FOR SIGNATURES OF KNOWLEDGE 309
MARC FISCHLIN AND CRISTINA ONETE
SESSION 7: ENCRYPTION
LBLOCK: A LIGHTWEIGHT BLOCK CIPHER 327
WENLING WU AND LEI ZHANG
ON HIDING A PLAINTEXT LENGTH BY PREENCRYPTION 345
CIHANGIR TEZCAN AND SERGE VAUDENAY
IMAGE 3
TABLE OF CONTENTS XIII
SESSION 8: BROADCAST ENCRYPTION
FIGHTING PIRATES 2.0 359
PAOLO D'ARCO AND ANGEL L. PEREZ DEL POZO
SECURITY NOTIONS FOR BROADCAST ENCRYPTION 377
DUONG HIEU PHAN, DAVID POINTCHEVAL, AND MARIO STRESSER
SESSION 9: SECURITY SERVICES
TOWARDS USER-FRIENDLY CREDENTIAL TRANSFER ON OPEN CREDENTIAL PLATFORMS
395
KARI KOSTIAINEN, N. ASOKAN, AND ALEXANDRA AFANASYEVA
NON-TRANSFERABLE USER CERTIFICATION SECURE AGAINST AUTHORITY INFORMATION
LEAKS AND IMPERSONATION ATTACKS 413
JACOB C.N. SCHULDT AND GOICHIRO HANAOKA
COMPOSABLE SECURITY ANALYSIS OF OS SERVICES 431
RAN CANETTI, SURESH CHARI, SHAI HALEVI, BIRGIT PFITZMANN, ARNAB ROY,
MICHAEL STEINER, AND WIETSE VENEMA
SESSION 10: ATTACKS II
PRACTICAL ATTACKS ON THE MAELSTROM-0 COMPRESSION FUNCTION 449 STEFAN
KOELBL AND FLORIAN MENDEL
LINEAR ANALYSIS OF REDUCED-ROUND CUBEHASH 462
TOMER ASHUR AND ORR DUNKELMAN
ON THE INDIFFERENTIABILITY OF FUGUE AND LUFFA 479
RISHIRAJ BHATTACHARYYA AND AVRADIP MANDAI
ANALYSIS OF MESSAGE INJECTION IN STREAM CIPHER-BASED HASH FUNCTIONS 498
YUTO NAKANO, CARLOS CID, KAZUHIDE FUKUSHIMA, AND SHINSAKU KIYOMOTO
SESSION 11: APPLIED CRYPTO II
SECURE AUTHENTICATED COMPARISONS 514
KEITH B. FRIKKEN, HAO YUAN, AND MIKHAIL J. ATALLAH
PUBLIC-KEY ENCRYPTION WITH DELEGATED SEARCH 532
LUAN IBRAIMI, SVETLA NIKOVA, PIETER HARTEL, AND WILLEM JONKER
AUTHOR INDEX 551 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV039102420 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)725282473 (DE-599)DNB1011530392 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039102420</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110816</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110627s2011 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N19</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,A25</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1011530392</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642215537</subfield><subfield code="c">kart. : EUR 74.90 (DE) (freier Pr.), ca. sfr 100.50 (freier Pr.)</subfield><subfield code="9">978-3-642-21553-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">364221553X</subfield><subfield code="9">3-642-21553-X</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642215537</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80064296</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)725282473</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1011530392</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied cryptography and network security</subfield><subfield code="b">9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings</subfield><subfield code="c">Javier Lopez ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 552 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6715</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Nerja</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Javier</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACNS</subfield><subfield code="n">9</subfield><subfield code="d">2011</subfield><subfield code="c">Nerja</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16160226-5</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Applied Cryptography and Network Security</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6715</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6715</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3766167&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022646326&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-022646326</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Nerja gnd-content |
genre_facet | Konferenzschrift 2011 Nerja |
id | DE-604.BV039102420 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:46Z |
institution | BVB |
institution_GND | (DE-588)16160226-5 |
isbn | 9783642215537 364221553X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-022646326 |
oclc_num | 725282473 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-739 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-739 |
physical | XIII, 552 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings Javier Lopez ... (eds.) Berlin [u.a.] Springer 2011 XIII, 552 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6715 Literaturangaben Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Nerja gnd-content Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s DE-604 Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Lopez, Javier Sonstige oth ACNS 9 2011 Nerja Sonstige (DE-588)16160226-5 oth Erscheint auch als Online-Ausgabe Applied Cryptography and Network Security Lecture notes in computer science 6715 (DE-604)BV000000607 6715 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3766167&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022646326&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings |
title_auth | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings |
title_exact_search | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings |
title_full | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings Javier Lopez ... (eds.) |
title_fullStr | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings Javier Lopez ... (eds.) |
title_full_unstemmed | Applied cryptography and network security 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings Javier Lopez ... (eds.) |
title_short | Applied cryptography and network security |
title_sort | applied cryptography and network security 9th international conference acns 2011 nerja spain june 7 10 2011 proceedings |
title_sub | 9th international conference, ACNS 2011, Nerja, Spain, June 7 - 10, 2011 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Datensicherung Rechnernetz Kryptoanalyse Kryptosystem Computersicherheit Kryptologie Konferenzschrift 2011 Nerja |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3766167&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=022646326&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT lopezjavier appliedcryptographyandnetworksecurity9thinternationalconferenceacns2011nerjaspainjune7102011proceedings AT acnsnerja appliedcryptographyandnetworksecurity9thinternationalconferenceacns2011nerjaspainjune7102011proceedings |