Information security and cryptology - ICISC 2011: 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7259 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 512 S. Ill., graph. Darst. |
ISBN: | 3642319114 9783642319112 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040433408 | ||
003 | DE-604 | ||
005 | 20121005 | ||
007 | t| | ||
008 | 120924s2012 xx ad|| |||| 10||| eng d | ||
015 | |a 12,N27 |2 dnb | ||
016 | 7 | |a 1023650924 |2 DE-101 | |
020 | |a 3642319114 |c pbk |9 3-642-31911-4 | ||
020 | |a 9783642319112 |c Pb. : ca. EUR 74.90 (DE) (freier Pr.), ca. EUR 77.00 (AT) (freier Pr.), ca. sfr 93.50 (freier Pr.) |9 978-3-642-31911-2 | ||
024 | 3 | |a 9783642319112 | |
028 | 5 | 2 | |a Best.-Nr.: 86132523 |
035 | |a (OCoLC)815928207 | ||
035 | |a (DE-599)DNB1023650924 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-706 |a DE-91G |a DE-11 |a DE-525 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
111 | 2 | |a ICISC |n 14. |d 2011 |c Seoul |j Verfasser |0 (DE-588)1026213592 |4 aut | |
245 | 1 | 0 | |a Information security and cryptology - ICISC 2011 |b 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers |c Howon Kim (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XII, 512 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7259 | |
650 | 0 | 7 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Seoul |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 1 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |D s |
689 | 1 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | 1 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Kim, Howon |e Sonstige |0 (DE-588)1026213533 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-31912-9 |
830 | 0 | |a Lecture notes in computer science |v 7259 |w (DE-604)BV000000607 |9 7259 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025285915&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025285915 |
Datensatz im Suchindex
_version_ | 1820875417550061568 |
---|---|
adam_text |
IMAGE 1
TABLE O F CONTENTS
HASH F U N C T I O N I IMPROVED INTEGRAL ANALYSIS ON TWEAKED LESAMNTA 1
YU SASAKI AND KAZUMARO AOKI
ANALYSIS OF TRIVIUM USING COMPRESSED RIGHT HAND SIDE EQUATIONS 18
THORSTEN ERNST SCHILLING AND HAVARD RADDUM
CRYPTANALYSIS OF ROUND-REDUCED HAS-160 33
FLORIAN MENDEL. TOMISLAV NAD, AND MARTIN SCHLAFFER
S I D E C H A N N E L A N A L Y S I S I
AN EFFICIENT METHOD FOR ELIMINATING RANDOM DELAYS IN POWER TRACES OF
EMBEDDED SOFTWARE 48
DAEHYUN STROBEL AND CHRISTOF PAAR
AN EFFICIENT LEAKAGE CHARACTERIZATION METHOD FOR PROFILED POWER ANALYSIS
ATTACKS 61
HAILONG ZHANG, YONGBIN ZHOU, AND DENGGUO FENG
CORRECTING ERRORS IN PRIVATE KEYS OBTAINED FROM COLD BOOT ATTACKS . . .
74 HYUNG TAE LEE, HONGTAE KIM, YOO-JIN BAEK, AND JUNG HEE CHEON
P U B L I C K E Y C R Y P T O G R A P H Y
STRONG SECURITY NOTIONS FOR TIMED-RELEASE PUBLIC-KEY ENCRYPTION
REVISITED 88
RYO KIKUCHI, ATSUSHI FUJIOKA, YOSHIAKI OKAMOTO, AND TAIICHI SAITO
FULLY SECURE UNIDIRECTIONAL IDENTITY-BASED PROXY RE-ENCRYPTION 109 SONG
LUO, QINGNI SHEN, AND ZHONG CHEN
N E T W O R K A N D M O B I L E S E C U R I T Y
DETECTING PARASITE P 2 P BOTNET IN EMU/E-LIKE NETWORKS THROUGH
QUASI-PERIODICITY RECOGNITION 127
YONG QIAO, YUEXIANG YANG, JIE HE, BO LIU, AND YINGZHI ZENG
AUTODUNT: DYNAMIC LATENT DEPENDENCE ANALYSIS FOR DETECTION OF ZERO DAY
VULNERABILITY 140
KAI CHEN, YIFENG LIAN, AND YINGJUN ZHANG
HTTP://D-NB.INFO/1023650924
IMAGE 2
X TABLE OF CONTENTS
D I G I T A L S I G N A T U R E
WEAKNESSES IN CURRENT RSA SIGNATURE SCHEMES 155
JULIANE KRAMER, DMITRY NEDOSPASOV, AND JEAN-PIERRE SEIFERT
BACK PROPAGATION NEURAL NETWORK BASED LEAKAGE CHARACTERIZATION FOR
PRACTICAL SECURITY ANALYSIS OF CRYPTOGRAPHIC IMPLEMENTATIONS 169 SHUGUO
YANG, YONGBIN ZHOU, JIYE LIU, AND DANYANG CHEN
S I D E C H A N N E L A N A L Y S I S I I
A REVOCABLE GROUP SIGNATURE SCHEME WITH THE PROPERTY OF HIDING THE
NUMBER OF REVOKED USERS 186
KEITA EMURA, ATSUKO MIYAJI, AND KAZUMASA OMOTE
GENERIC CONSTRUCTIONS FOR VERIFIABLE SIGNCRYPTION 204
LAILA EL AIMANI
NON-DELEGATABLE STRONG DESIGNATED VERIFIER SIGNATURE ON ELLIPTIC CURVES
219
HAIBO TIAN, XIAOFENG CHEN, ZHENGTAO JIANG, AND YUSONG D U
C R Y P T A N A L Y S I S
AN IMPROVED KNOWN PLAINTEXT ATTACK ON P K Z I P ENCRYPTION ALGORITHM 235
KYUNG CHUL JEONG, DONG HOON LEE, AND DAEWAN HAN
SYNTHETIC LINEAR ANALYSIS: IMPROVED ATTACKS ON CUBEHASH AND RABBIT 248
YI LU, SERGE VAUDENAY, WILLI MEIER, LIPING DING, AND JIANCHUN JIANG
O N THE RESISTANCE OF BOOLEAN FUNCTIONS AGAINST FAST ALGEBRAIC ATTACKS
261
YUSONG DU, FANGGUO ZHANG, AND MEICHENG L I U
CCA SECURE IB-KEM FROM THE COMPUTATIONAL BILINEAR DIFFIE-HELLMAN
ASSUMPTION IN THE STANDARD MODEL 275
YU CHEN, LIQUN CHEN, AND ZONGYANG ZHANG
EFFICIENT I M P L E M E N T A T I O N
DESIGN, IMPLEMENTATION, AND EVALUATION OF A VEHICULAR HARDWARE SECURITY
MODULE 302
MARKO WOLF AND TIMO GENDRULLIS
IMAGE 3
TABLE OF CONTENTS X I
EFFICIENT MODULAR EXPONENTIATION-BASED PUZZLES FOR DENIAL-OF-SERVICE
PROTECTION 319
JOTHI RANGASAMY, DOUGLAS STEBILA, LAKSHMI KUPPUSAMY, COLIN BOYD, AND
JUAN GONZALEZ NIETO
IMPLEMENTING INFORMATION-THEORETICALLY SECURE OBLIVIOUS TRANSFER FROM
PACKET REORDERING 332
PAOLO PALMIERI AND OLIVIER PEREIRA
H A S H F U N C T I O N I I
COMPRESSION FUNCTIONS USING A DEDICATED BLOCKCIPHER FOR LIGHTWEIGHT
HASHING 346
SHOICHI HIROSE, HIDENORI KUWAKADO, AND HIROTAKA YOSHIDA
BICLIQUE ATTACK ON THE FULL HIGHT 365
DEUKJO HONG, BONWOOK KOO, AND DAESUNG K W O N
PREIMAGE ATTACKS ON STEP-REDUCED SM3 HASH FUNCTION 375
JIAN ZOU, WENLING WU, SHUANG WU, BOZHAN SU, AND LE DONG
C R Y P T O G R A P H I C A P P L I C A T I O N
BREAKING A 3D-BASED C A P T C H A SCHEME 391
VU DUE NGUYEN, YANG- WAI CHOW, AND WILLY SUSILO
MULTI-USER KEYWORD SEARCH SCHEME FOR SECURE D A T A SHARING WITH
FINE-GRAINED ACCESS CONTROL 406
FANGMING ZHAO, TAKASHI NISHIDE, AND KOUICHI SAKURAI
REACTION ATTACK ON OUTSOURCED COMPUTING WITH FULLY HOMOMORPHIC
ENCRYPTION SCHEMES 419
ZHENFEI ZHANG, THOMAS PLANTARD, AND WILLY SUSILO
A BLIND DIGITAL IMAGE WATERMARKING METHOD BASED ON THE DUAL-TREE COMPLEX
DISCRETE WAVELET TRANSFORM AND INTERVAL ARITHMETIC 437
TERUYA MINAMOTO. AND RYUJI OHURA
C R Y P T O G R A P H I C P R O T O C O L
ON THE COMMUNICATION COMPLEXITY OF RELIABLE AND SECURE MESSAGE
TRANSMISSION IN ASYNCHRONOUS NETWORKS 450
ASHISH CHOUDHURY AND ARPITA PATRA
IMAGE 4
XII TABLE OF CONTENTS
TWO-PARTY ROUND-OPTIMAL SESSION-POLICY ATTRIBUTE-BASED AUTHENTICATED KEY
EXCHANGE WITHOUT RANDOM ORACLES 467
KAZUKI YONEYAMA
SUFFICIENT CONDITION FOR IDENTITY-BASED AUTHENTICATED KEY EXCHANGE
RESILIENT TO LEAKAGE OF SECRET KEYS 490
ATSUSHI FUJIOKA AND KOUTAROU SUZUKI
A U T H O R I N D E X 511 |
any_adam_object | 1 |
author_GND | (DE-588)1026213533 |
author_corporate | ICISC Seoul |
author_corporate_role | aut |
author_facet | ICISC Seoul |
author_sort | ICISC Seoul |
building | Verbundindex |
bvnumber | BV040433408 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)815928207 (DE-599)DNB1023650924 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040433408</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121005</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120924s2012 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N27</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1023650924</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642319114</subfield><subfield code="c">pbk</subfield><subfield code="9">3-642-31911-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642319112</subfield><subfield code="c">Pb. : ca. EUR 74.90 (DE) (freier Pr.), ca. EUR 77.00 (AT) (freier Pr.), ca. sfr 93.50 (freier Pr.)</subfield><subfield code="9">978-3-642-31911-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642319112</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86132523</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815928207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1023650924</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-525</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ICISC</subfield><subfield code="n">14.</subfield><subfield code="d">2011</subfield><subfield code="c">Seoul</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1026213592</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and cryptology - ICISC 2011</subfield><subfield code="b">14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers</subfield><subfield code="c">Howon Kim (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 512 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7259</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Seoul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kim, Howon</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1026213533</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-31912-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7259</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7259</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025285915&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025285915</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Seoul gnd-content |
genre_facet | Konferenzschrift 2011 Seoul |
id | DE-604.BV040433408 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:17Z |
institution | BVB |
institution_GND | (DE-588)1026213592 |
isbn | 3642319114 9783642319112 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025285915 |
oclc_num | 815928207 |
open_access_boolean | |
owner | DE-83 DE-706 DE-91G DE-BY-TUM DE-11 DE-525 |
owner_facet | DE-83 DE-706 DE-91G DE-BY-TUM DE-11 DE-525 |
physical | XII, 512 S. Ill., graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ICISC 14. 2011 Seoul Verfasser (DE-588)1026213592 aut Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers Howon Kim (ed.) Berlin [u.a.] Springer 2012 XII, 512 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7259 Private-Key-Kryptosystem (DE-588)4317451-6 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Seoul gnd-content Kryptoanalyse (DE-588)4830502-9 s DE-604 Kryptologie (DE-588)4033329-2 s Private-Key-Kryptosystem (DE-588)4317451-6 s Hash-Algorithmus (DE-588)4323071-4 s Rechnernetz (DE-588)4070085-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kim, Howon Sonstige (DE-588)1026213533 oth Erscheint auch als Online-Ausgabe 978-3-642-31912-9 Lecture notes in computer science 7259 (DE-604)BV000000607 7259 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025285915&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers Lecture notes in computer science Private-Key-Kryptosystem (DE-588)4317451-6 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
subject_GND | (DE-588)4317451-6 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4323071-4 (DE-588)1071861417 |
title | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers |
title_auth | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers |
title_exact_search | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers |
title_full | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers Howon Kim (ed.) |
title_fullStr | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers Howon Kim (ed.) |
title_full_unstemmed | Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers Howon Kim (ed.) |
title_short | Information security and cryptology - ICISC 2011 |
title_sort | information security and cryptology icisc 2011 14th international conference seoul korea november 30 december 2 2011 revised selected papers |
title_sub | 14th international conference, Seoul, Korea, November 30 - December 2, 2011 ; revised selected papers |
topic | Private-Key-Kryptosystem (DE-588)4317451-6 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
topic_facet | Private-Key-Kryptosystem Kryptoanalyse Computersicherheit Kryptologie Sicherheitsprotokoll Datensicherung Rechnernetz Hash-Algorithmus Konferenzschrift 2011 Seoul |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025285915&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT iciscseoul informationsecurityandcryptologyicisc201114thinternationalconferenceseoulkoreanovember30december22011revisedselectedpapers AT kimhowon informationsecurityandcryptologyicisc201114thinternationalconferenceseoulkoreanovember30december22011revisedselectedpapers |