Security protocols XIX: 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
7114 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | IX, 380 S. graph. Darst. |
ISBN: | 3642258662 9783642258664 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039753584 | ||
003 | DE-604 | ||
005 | 20150113 | ||
007 | t | ||
008 | 111212s2011 gw d||| |||| 10||| eng d | ||
015 | |a 11,N46 |2 dnb | ||
016 | 7 | |a 1016907567 |2 DE-101 | |
020 | |a 3642258662 |9 3-642-25866-2 | ||
020 | |a 9783642258664 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-25866-4 | ||
024 | 3 | |a 9783642258664 | |
028 | 5 | 2 | |a Best.-Nr.: 86019831 |
035 | |a (OCoLC)769469284 | ||
035 | |a (DE-599)DNB1016907567 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Security protocols XIX |b 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers |c Bruce Christianson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a IX, 380 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7114 | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a RFID |0 (DE-588)4509863-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Cambridge |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a RFID |0 (DE-588)4509863-3 |D s |
689 | 0 | 4 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 5 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Christianson, Bruce |d 1958- |e Sonstige |0 (DE-588)1064909507 |4 oth | |
711 | 2 | |a International Security Protocols Workshop |n 19 |d 2011 |c Cambridge |j Sonstige |0 (DE-588)16332995-3 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-25867-1 |
830 | 0 | |a Lecture notes in computer science |v 7114 |w (DE-604)BV000000607 |9 7114 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024614935&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024614935 |
Datensatz im Suchindex
_version_ | 1805145711467036672 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
INTRODUCTION: ALICE DOESN'T LIVE HERE ANYMORE (TRANSCRIPT) 1
BRUCE CHRISTIANSON
HIS LATE MASTER'S VOICE: BARKING FOR LOCATION PRIVACY 4
MIKE BURMESTER
HIS LATE MASTER'S VOICE (TRANSCRIPT OF DISCUSSION) 15
MIKE BURMESTER
CAN WE FIX THE SECURITY ECONOMICS OF FEDERATED AUTHENTICATION? 25 ROSS
ANDERSON
CAN WE FIX THE SECURITY ECONOMICS OF FEDERATED AUTHENTICATION?
(TRANSCRIPT OF DISCUSSION) 33
ROSS ANDERSON
PICO: NO MORE PASSWORDS! 49
FRANK STAJANO
PICO: NO MORE PASSWORDS! (TRANSCRIPT OF DISCUSSION) 82
FRANK STAJANO
GETTING WEB AUTHENTICATION RIGHT: A BEST-CASE PROTOCOL FOR THE REMAINING
LIFE OF PASSWORDS 98
JOSEPH BONNEAU
GETTING WEB AUTHENTICATION RIGHT (TRANSCRIPT OF DISCUSSION) 105 JOSEPH
BONNEAU
WHEN CONTEXT IS BETTER THAN IDENTITY: AUTHENTICATION BY CONTEXT USING
EMPIRICAL CHANNELS 115
BANGDAO CHEN, LONG HOANG NGUYEN, AND ANDREW WILLIAM ROSCOE
WHEN CONTEXT IS BETTER THAN IDENTITY (TRANSCRIPT OF DISCUSSION) 126
BANGDAO CHEN
SELECTIVE LOCATION BLINDING USING HASH CHAINS 132
GABRIELE LENZINI, SJOUKE MAUW, AND JUN PANG
SELECTIVE LOCATION BLINDING USING HASH CHAINS (TRANSCRIPT OF DISCUSSION)
142
SJOUKE MAUW
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016907567
DIGITALISIERT DURCH
IMAGE 2
VIII TABLE OF CONTENTS
RISKS OF BLIND CONTROLLERS AND DEAF VIEWS IN MODEL VIEW CONTROLLER
PATTERNS FOR MULTITAG USER INTERFACES 150
ALF ZUGENMAIER
RISK OF BLIND CONTROLLER PATTERNS FOR MULTITAG USER INTERFACES
(TRANSCRIPT OF DISCUSSION) 156
ALF ZUGENMAIER
HOW TO SYNC WITH ALICE 170
FENG HAO AND PETER Y.A. RYAN
HOW TO SYNC WITH ALICE (TRANSCRIPT OF DISCUSSION) 179
FENG HAO
ATTACK DETECTION VS. PRIVACY - HOW TO FIND THE LINK OR HOW TO HIDE IT?
189
JIFI KUER, VASHEK MATYAS, ANDRIY STETSKO, AND PETR SVENDA
ATTACK DETECTION VS PRIVACY - HOW TO FIND THE LINK OR HOW TO HIDE IT
(TRANSCRIPT OF DISCUSSION) 200
JIFI KVX AND ANDRIY STETSKO
THE SENSE OF SECURITY AND A COUNTERMEASURE FOR THE FALSE SENSE 205 YUKO
MURAYAMA, YASUHIRO FUJIHARA, AND DAI NISHIOKA
THE SENSE OF SECURITY AND A COUNTERMEASURE FOR THE FALSE SENSE
(TRANSCRIPT OF DISCUSSION) 215
JAMES MALCOLM
TOWARDS A THEORY OF TRUST IN NETWORKS OF HUMANS AND COMPUTERS 223 VIRGIL
GLIGOR AND JEANNETTE M. WING
TOWARDS A THEORY OF TRUST IN NETWORKS OF HUMANS AND COMPUTERS
(TRANSCRIPT OF DISCUSSION) 243
VIRGIL GLIGOR
GEARING UP: HOW TO EAT YOUR CRYPTOCAKE AND STILL HAVE IT 258
ALEX SHAFARENKO AND BRUCE CHRISTIANSON
GEARING UP: HOW TO EAT YOUR CRYPTOCAKE AND STILL HAVE IT (TRANSCRIPT OF
DISCUSSION) 260
ALEX SHAFARENKO
MAKE NOISE AND WHISPER: A SOLUTION TO RELAY ATTACKS 271
OMAR CHOUDARY AND FRANK STAJANO
MAKE NOISE AND WHISPER: A SOLUTION TO RELAY ATTACKS (TRANSCRIPT OF
DISCUSSION) 284
OMAR CHOUDARY
IMAGE 3
TABLE OF CONTENTS IX
SCRAMBLING FOR LIGHTWEIGHT CENSORSHIP RESISTANCE 296
JOSEPH BONNEAU AND RUBIN XU
SCRAMBLING FOR LIGHTWEIGHT CENSORSHIP RESISTANCE (TRANSCRIPT OF
DISCUSSION) 303
RUBIN XU
THE METAPLACE SECURITY MODEL 313
MICHAEL ROE
THE METAPLACE SECURITY MODEL (TRANSCRIPT OF DISCUSSION) 327
MICHAEL ROE
ONE-WAY CRYPTOGRAPHY 336
SANDY CLARK, TRAVIS GOODSPEED, PERRY METZGER, ZACHARY WASSERMAN, KEVIN
XU, AND MATT BLAZE
ONE-WAY CRYPTOGRAPHY (TRANSCRIPT OF DISCUSSION) 341
MATT BLAZE
HOW TO KEEP BAD PAPERS OUT OF CONFERENCES (WITH MINIMUM REVIEWER EFFORT)
359
JONATHAN ANDERSON, FRANK STAJANO, AND ROBERT N.M. WATSON
HOW TO KEEP BAD PAPERS OUT OF CONFERENCES (TRANSCRIPT OF DISCUSSION) 368
JONATHAN ANDERSON
POSTSCRIPT: ALICE REFLECTS UPON THE STATE OF THE ART IN SECURITY
PROTOCOL DESIGN 381
AUTHOR INDEX 383 |
any_adam_object | 1 |
author_GND | (DE-588)1064909507 |
building | Verbundindex |
bvnumber | BV039753584 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)769469284 (DE-599)DNB1016907567 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039753584</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111212s2011 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N46</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016907567</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642258662</subfield><subfield code="9">3-642-25866-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642258664</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-25866-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642258664</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86019831</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)769469284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016907567</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols XIX</subfield><subfield code="b">19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers</subfield><subfield code="c">Bruce Christianson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 380 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7114</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Security Protocols Workshop</subfield><subfield code="n">19</subfield><subfield code="d">2011</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16332995-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-25867-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7114</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7114</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024614935&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024614935</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Cambridge gnd-content |
genre_facet | Konferenzschrift 2011 Cambridge |
id | DE-604.BV039753584 |
illustrated | Illustrated |
indexdate | 2024-07-21T00:18:21Z |
institution | BVB |
institution_GND | (DE-588)16332995-3 |
isbn | 3642258662 9783642258664 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024614935 |
oclc_num | 769469284 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | IX, 380 S. graph. Darst. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.) Berlin [u.a.] Springer 2011 IX, 380 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7114 Authentifikation (DE-588)4330656-1 gnd rswk-swf RFID (DE-588)4509863-3 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Cambridge gnd-content Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Privatsphäre (DE-588)4123980-5 s RFID (DE-588)4509863-3 s Trusted Computing (DE-588)7562931-8 s Kryptoanalyse (DE-588)4830502-9 s DE-604 Christianson, Bruce 1958- Sonstige (DE-588)1064909507 oth International Security Protocols Workshop 19 2011 Cambridge Sonstige (DE-588)16332995-3 oth Erscheint auch als Online-Ausgabe 978-3-642-25867-1 Lecture notes in computer science 7114 (DE-604)BV000000607 7114 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024614935&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Lecture notes in computer science Authentifikation (DE-588)4330656-1 gnd RFID (DE-588)4509863-3 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4509863-3 (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)7562931-8 (DE-588)4709127-7 (DE-588)1071861417 |
title | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers |
title_auth | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers |
title_exact_search | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers |
title_full | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.) |
title_fullStr | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.) |
title_full_unstemmed | Security protocols XIX 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers Bruce Christianson ... (eds.) |
title_short | Security protocols XIX |
title_sort | security protocols xix 19th international workshop cambridge uk march 28 30 2011 revised selected papers |
title_sub | 19th international workshop, Cambridge, UK, March 28 - 30, 2011 ; revised selected papers |
topic | Authentifikation (DE-588)4330656-1 gnd RFID (DE-588)4509863-3 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Authentifikation RFID Privatsphäre Kryptoanalyse Trusted Computing Sicherheitsprotokoll Konferenzschrift 2011 Cambridge |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3906978&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024614935&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT christiansonbruce securityprotocolsxix19thinternationalworkshopcambridgeukmarch28302011revisedselectedpapers AT internationalsecurityprotocolsworkshopcambridge securityprotocolsxix19thinternationalworkshopcambridgeukmarch28302011revisedselectedpapers |