Cryptology and network security: 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7712 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XVI, 309 S. graph. Darst. |
ISBN: | 3642354033 9783642354038 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040636462 | ||
003 | DE-604 | ||
005 | 20130116 | ||
007 | t| | ||
008 | 121217s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N45 |2 dnb | ||
016 | 7 | |a 1027423000 |2 DE-101 | |
020 | |a 3642354033 |9 3-642-35403-3 | ||
020 | |a 9783642354038 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-35403-8 | ||
024 | 3 | |a 9783642354038 | |
028 | 5 | 2 | |a Best.-Nr.: 86192155 |
035 | |a (OCoLC)823257816 | ||
035 | |a (DE-599)DNB1027423000 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-91G |a DE-11 | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Cryptology and network security |b 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings |c Josef Pieprzyk ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XVI, 309 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7712 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Darmstadt |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Pieprzyk, Josef |d 1949- |e Sonstige |0 (DE-588)122464095 |4 oth | |
711 | 2 | |a CANS |n 11 |d 2012 |c Darmstadt |j Sonstige |0 (DE-588)1029065292 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-35404-5 |
830 | 0 | |a Lecture notes in computer science |v 7712 |w (DE-604)BV000000607 |9 7712 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4171975&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025463606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025463606 |
Datensatz im Suchindex
_version_ | 1820875439463202816 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
CRYPTANALYSIS
CONDITIONAL DIFFERENTIAL CRYPTANALYSIS OF GRAIN-128A 1
MICHAEL LEHMANN AND WILLI MEIER
A REAL-TIME KEY RECOVERY ATTACK ON T H E LIGHTWEIGHT STREAM CIPHER A2U2
12
ZHENQING SHI. XIUTAO FENG. DENGGUO FENG, AND CHUANKUN W U
A SIMPLE KEY-RECOVERY ATTACK ON MCOE-X 23
FLORIAN MENDEL, BART MENNINK, VINCENT RIJMEN, AND ELMAR TISCHHAUSER
CRYPTANALYSIS OF A LATTICE-KNAPSACK MIXED PUBLIC KEY CRYPTOSYSTEM 32
JUN XU, LEI HU, SIWEI SUN, AND PING WANG
BICLIQUE CRYPTANALYSIS OF T W I N E 43
MUSTAFA QOBAN, FERHAT KARAKOG, AND OZKAN BOZTA§
DIFFERENTIAL AND LINEAR ATTACKS ON T H E FULL WIDEA-N BLOCK CIPHERS
(UNDER WEAK KEYS) 56
JORGE NAKAHARA JR.
IMPROVED LINEAR ANALYSIS ON BLOCK CIPHER MULTI2 72
YI LU, LIPING DING, AND YONGJI WANG
FIXED POINTS OF SPECIAL TYPE AND CRYPTANALYSIS OF FULL GOST 86
ORHUN KARA AND FERHAT KARAKOG
N E T W O R K S E C U R I T Y
ATTACKING ANIMATED CAPTCHAS VIA CHARACTER EXTRACTION 98
VU DUE NGUYEN, YANG-WAI CHOW, AND WILLY SUSILO
ANALYSIS OF ROGUE ANTI-VIRUS CAMPAIGNS USING HIDDEN STRUCTURES IN
FC-PARTITE GRAPHS 114
ORESTIS TSIGKAS AND DIMITRIOS TZOVARAS
MOBILE EVIL TWIN MALNETS - T H E WORST OF BOTH WORLDS 126
CHRISTIAN SZONGOTT, BENJAMIN HENNE, AND MATTHEW SMITH
FIRM GRIP HANDSHAKES: A TOOL FOR BIDIRECTIONAL VOUCHING 142
OMER BERKMAN, BENNY PINKAS, AND MOTI YUNG
HTTP://D-NB.INFO/1027423000
IMAGE 2
XVI TABLE OF CONTENTS
C R Y P T O G R A P H I C P R O T O C O L S
GROUP KEY ESTABLISHMENT: ADDING PERFECT FORWARD SECRECY A T THE COST OF
ONE ROUND KASHI NEUPANE, RAINER STEINWANDT, AND ADRIANA SUAREZ CORONA
APPLICABILITY OF OR-PROOF TECHNIQUES T O HIERARCHICAL IDENTITY-BASED
IDENTIFICATION ATSUSHI FUJIOKA, TAIICHI SAITO, AND KEITA XAGAWA
LIBRA-CAN: A LIGHTWEIGHT BROADCAST AUTHENTICATION PROTOCOL FOR
CONTROLLER AREA NETWORKS BOGDAN GROZA, STEFAN MURVAY, ANTHONY VAN
HERREWEGE, AND INGRID VERBAUWHEDE
EFFICIENT VERIFICATION OF INPUT CONSISTENCY IN SERVER-ASSISTED SECURE
FUNCTION EVALUATION VLADIMIR KOLESNIKOV, RANJIT KUMARESAN, AND
ABDULLATIF SHIKFA
FAST AND PRIVATE COMPUTATION OF CARDINALITY OF SET INTERSECTION AND
UNION EMILIANO DE CRISTOFARO, PAOLO GASTI, AND GENE TSUDIK
E N C R Y P T I O N
FAST AND SECURE ROOT FINDING FOR CODE-BASED CRYPTOSYSTEMS 232
FALKO STRENZKE
STRONG PRIVACY FOR RFID SYSTEMS FROM PLAINTEXT-AWARE ENCRYPTION . . . .
247 KHALED OUAFI AND SERGE VAUDENAY
HOW T O ENHANCE THE SECURITY ON THE LEAST SIGNIFICANT BIT 263
ATSUKO MIYAJI AND YIREN MO
S - B O X T H E O R Y
IMPROVEMENT IN NON-LINEARITY OF CARLET-FENG INFINITE CLASS OF BOOLEAN
FUNCTIONS 280
MANSOOR AHMED KHAN AND FERRUH OZBUDAK
SOME REPRESENTATIONS OF T H E S-BOX OF CAMELLIA IN G F ( ( ( 2 2 ) 2 ) 2
) 296
ALBERTO F. MARTINEZ-HERRERA, J. CARLOS MEX-PERERA, AND JUAN A.
NOLAZCO-FLORES
A U T H O R I N D E X 311
158
169
185
201
218 |
any_adam_object | 1 |
author_GND | (DE-588)122464095 |
building | Verbundindex |
bvnumber | BV040636462 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)823257816 (DE-599)DNB1027423000 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040636462</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130116</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">121217s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N45</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1027423000</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642354033</subfield><subfield code="9">3-642-35403-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642354038</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-35403-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642354038</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86192155</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)823257816</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1027423000</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings</subfield><subfield code="c">Josef Pieprzyk ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 309 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7712</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Darmstadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="d">1949-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)122464095</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">11</subfield><subfield code="d">2012</subfield><subfield code="c">Darmstadt</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1029065292</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-35404-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7712</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7712</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4171975&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025463606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025463606</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Darmstadt gnd-content |
genre_facet | Konferenzschrift 2012 Darmstadt |
id | DE-604.BV040636462 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:38Z |
institution | BVB |
institution_GND | (DE-588)1029065292 |
isbn | 3642354033 9783642354038 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025463606 |
oclc_num | 823257816 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
physical | XVI, 309 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Josef Pieprzyk ... (eds.) Berlin [u.a.] Springer 2012 XVI, 309 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7712 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Darmstadt gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Kryptologie (DE-588)4033329-2 s 1\p DE-604 Pieprzyk, Josef 1949- Sonstige (DE-588)122464095 oth CANS 11 2012 Darmstadt Sonstige (DE-588)1029065292 oth Erscheint auch als Online-Ausgabe 978-3-642-35404-5 Lecture notes in computer science 7712 (DE-604)BV000000607 7712 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4171975&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025463606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings |
title_auth | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings |
title_exact_search | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings |
title_full | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Josef Pieprzyk ... (eds.) |
title_fullStr | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Josef Pieprzyk ... (eds.) |
title_full_unstemmed | Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Josef Pieprzyk ... (eds.) |
title_short | Cryptology and network security |
title_sort | cryptology and network security 11th international conference cans 2012 darmstadt germany december 12 14 2012 proceedings |
title_sub | 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Datensicherung Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Kryptologie Sicherheitsprotokoll Konferenzschrift 2012 Darmstadt |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4171975&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025463606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT pieprzykjosef cryptologyandnetworksecurity11thinternationalconferencecans2012darmstadtgermanydecember12142012proceedings AT cansdarmstadt cryptologyandnetworksecurity11thinternationalconferencecans2012darmstadtgermanydecember12142012proceedings |