Security protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7028 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | IX, 364 S. Ill., graph. Darst. |
ISBN: | 3642362125 9783642362125 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040791145 | ||
003 | DE-604 | ||
005 | 20150113 | ||
007 | t| | ||
008 | 130301s2013 gw ad|| |||| 00||| eng d | ||
016 | 7 | |a 1030083649 |2 DE-101 | |
020 | |a 3642362125 |9 3-642-36212-5 | ||
020 | |a 9783642362125 |9 978-3-642-36212-5 | ||
035 | |a (OCoLC)840410673 | ||
035 | |a (DE-599)DNB1030083649 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Security protocols XVII |b 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |c Bruce Christianson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a IX, 364 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7028 | |
650 | 0 | 7 | |a Elektronische Wahl |0 (DE-588)4432990-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Cambridge |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Elektronische Wahl |0 (DE-588)4432990-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Christianson, Bruce |d 1958- |e Sonstige |0 (DE-588)1064909507 |4 oth | |
711 | 2 | |a International Workshop on Security Protocols |n 17 |d 2009 |c Cambridge |j Sonstige |0 (DE-588)1031963332 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-36213-2 |
830 | 0 | |a Lecture notes in computer science |v 7028 |w (DE-604)BV000000607 |9 7028 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4240472&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025769273&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025769273 |
Datensatz im Suchindex
_version_ | 1820875443065061376 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
INTRODUCTION: BRIEF ENCOUNTERS (TRANSCRIPT OF DISCUSSION) 1
BRUCE CHRISTIANSON
EVOLUTIONARY DESIGN OF ATTACK STRATEGIES 3
JIFI KUR, VACLAV MATYAS, AND PETR SVENDA
EVOLUTIONARY DESIGN OF ATTACK STRATEGIES (TRANSCRIPT OF DISCUSSION) .
18 PETR SVENDA
BELOW THE SALT: THE DANGERS OF UNFULFILLED PHYSICAL MEDIA ASSUMPTIONS 24
MATT BLAZE AND PATRICK MCDANIEL
IS THE HONEYMOON OVER? (TRANSCRIPT OF DISCUSSION) 28
MATT BLAZE
BELOW THE SALT (TRANSCRIPT OF DISCUSSION) 34
MATT BLAZE
ATTACKING EACH OTHER 41
WIHEM ARSAC, GIAMPAOLO BELLA, XAVIER CHANTRY, AND LUCA COMPAGNA
ATTACKING EACH OTHER (TRANSCRIPT OF DISCUSSION) 48
XAVIER CHANTRY
BRINGING ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE TO PRACTICE 51
ENDRE BANGERTER, STEFANIA BARZAN, STEPHAN KRENN, AHMAD-REZA SADEGHI,
THOMAS SCHNEIDER, AND JOE-KAI TSAY
BRINGING ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE TO PRACTICE (TRANSCRIPT OF
DISCUSSION) 63
STEPHAN KRENN
TOWARDS A VERIFIED REFERENCE IMPLEMENTATION OF A TRUSTED PLATFORM MODULE
69
AYBEK MUKHAMEDOV, ANDREW D. GORDON, AND MARK RYAN
TOWARDS A VERIFIED REFERENCE IMPLEMENTATION OF A TRUSTED PLATFORM MODULE
(TRANSCRIPT OF DISCUSSION) 82
AYBEK MUKHAMEDOV
HTTP://D-NB.INFO/1030083649
IMAGE 2
VIII TABLE OF CONTENTS
THE LEAST PRIVACY-DAMAGING CENTRALISED TRAFFIC DATA RETENTION
ARCHITECTURE (EXTENDED ABSTRACT) 87
GEORGE DANEZIS
THE LEAST PRIVACY-DAMAGING CENTRALISED TRAFFIC DATA RETENTION
ARCHITECTURE (TRANSCRIPT OF DISCUSSION) 93
GEORGE DANEZIS
PRETTY GOOD DEMOCRACY ILL
PETER Y.A. RYAN AND VANESSA TEAGUE
PRETTY GOOD DEMOCRACY (TRANSCRIPT OF DISCUSSION) 131
PETER Y.A. RYAN
DESIGN AND VERIFICATION OF ANONYMOUS TRUST PROTOCOLS 143
MICHAEL BACKES AND MATTEO MAFFEI
DESIGN AND VERIFICATION OF ANONYMOUS TRUST PROTOCOLS (TRANSCRIPT OF
DISCUSSION) 149
MICHAEL BACKES
BRIEF ENCOUNTERS WITH A RANDOM KEY GRAPH 157
VIRGIL D. GLIGOR, ADRIAN PERRIG, AND JUN ZHAO
BRIEF ENCOUNTERS WITH A RANDOM KEY GRAPH (TRANSCRIPT OF DISCUSSION) 162
VIRGIL D. GLIGOR
TRUST*: USING LOCAL GUARANTEES TO EXTEND THE REACH OF TRUST 171
STEPHEN CLARKE, BRUCE CHRISTIANSON, AND HANNAN XIAO
TRUST*: USING LOCAL GUARANTEES TO EXTEND THE REACH OF TRUST (TRANSCRIPT
OF DISCUSSION) 179
BRUCE CHRISTIANSON
ALICE AND BOB IN LOVE: CRYPTOGRAPHIC COMMUNICATION USING SHARED
EXPERIENCES 189
JOSEPH BONNEAU
ALICE AND BOB IN LOVE (TRANSCRIPT OF DISCUSSION) 199
JOSEPH BONNEAU
WHY I'M NOT AN ENTROPIST 213
PAUL SYVERSON
WHY I'M NOT AN ENTROPIST (TRANSCRIPT OF DISCUSSION) 231
PAUL SYVERSON
DERIVING EPHEMERAL AUTHENTICATION USING CHANNEL AXIOMS 240
DUSKO PAVLOVIC AND CATHERINE MEADOWS
IMAGE 3
TABLE OF CONTENTS IX
DERIVING EPHEMERAL AUTHENTICATION USING CHANNEL AXIOMS (TRANSCRIPT OF
DISCUSSION) 262
CATHERINE MEADOWS
A NOVEL STATELESS AUTHENTICATION PROTOCOL 269
CHRIS J. MITCHELL
A NOVEL STATELESS AUTHENTICATION PROTOCOL (TRANSCRIPT OF DISCUSSION) . .
. 275 CHRIS J. MITCHELL
THE TRUST ECONOMY OF BRIEF ENCOUNTERS 282
ROSS ANDERSON
THE TRUST ECONOMY OF BRIEF ENCOUNTERS (TRANSCRIPT OF DISCUSSION) 285
ROSS ANDERSON
QUALITATIVE ANALYSIS FOR TRUST MANAGEMENT: TOWARDS A MODEL OF PHOTOGRAPH
SHARING INDISCRETION 298
SIMON N. FOLEY AND VIVIEN M. ROONEY
QUALITATIVE ANALYSIS FOR TRUST MANAGEMENT (TRANSCRIPT OF DISCUSSION) 308
SIMON N. FOLEY
ESTABLISHING DISTRIBUTED HIDDEN FRIENDSHIP RELATIONS 321
SOREN PREIBUSCH AND ALASTAIR R. BERESFORD
ESTABLISHING DISTRIBUTED HIDDEN FRIENDSHIP RELATIONS (TRANSCRIPT OF
DISCUSSION) 335
SOREN PREIBUSCH
NOT THAT KIND OF FRIEND: MISLEADING DIVERGENCES BETWEEN ONLINE SOCIAL
NETWORKS AND REAL-WORLD SOCIAL PROTOCOLS 343
JONATHAN ANDERSON AND FRANK STAJANO
NOT THAT KIND OF FRIEND (TRANSCRIPT OF DISCUSSION) 350
JONATHAN ANDERSON
THE FINAL WORD 365
AUTHOR INDEX 367 |
any_adam_object | 1 |
author_GND | (DE-588)1064909507 |
building | Verbundindex |
bvnumber | BV040791145 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f |
ctrlnum | (OCoLC)840410673 (DE-599)DNB1030083649 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040791145</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">130301s2013 gw ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1030083649</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642362125</subfield><subfield code="9">3-642-36212-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642362125</subfield><subfield code="9">978-3-642-36212-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)840410673</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1030083649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols XVII</subfield><subfield code="b">17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers</subfield><subfield code="c">Bruce Christianson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 364 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7028</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Wahl</subfield><subfield code="0">(DE-588)4432990-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Elektronische Wahl</subfield><subfield code="0">(DE-588)4432990-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security Protocols</subfield><subfield code="n">17</subfield><subfield code="d">2009</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1031963332</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-36213-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7028</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7028</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4240472&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025769273&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025769273</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Cambridge gnd-content |
genre_facet | Konferenzschrift 2009 Cambridge |
id | DE-604.BV040791145 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:43Z |
institution | BVB |
institution_GND | (DE-588)1031963332 |
isbn | 3642362125 9783642362125 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025769273 |
oclc_num | 840410673 |
open_access_boolean | |
owner | DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-11 DE-91G DE-BY-TUM |
physical | IX, 364 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) Berlin [u.a.] Springer 2013 IX, 364 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7028 Elektronische Wahl (DE-588)4432990-8 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Cambridge gnd-content Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Kryptoanalyse (DE-588)4830502-9 s Elektronische Wahl (DE-588)4432990-8 s DE-604 Christianson, Bruce 1958- Sonstige (DE-588)1064909507 oth International Workshop on Security Protocols 17 2009 Cambridge Sonstige (DE-588)1031963332 oth Erscheint auch als Online-Ausgabe 978-3-642-36213-2 Lecture notes in computer science 7028 (DE-604)BV000000607 7028 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4240472&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025769273&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Lecture notes in computer science Elektronische Wahl (DE-588)4432990-8 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4432990-8 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)7562931-8 (DE-588)4709127-7 (DE-588)1071861417 |
title | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
title_auth | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
title_exact_search | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
title_full | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) |
title_fullStr | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) |
title_full_unstemmed | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) |
title_short | Security protocols XVII |
title_sort | security protocols xvii 17th international workshop cambridge uk april 1 3 2009 revised selected papers |
title_sub | 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
topic | Elektronische Wahl (DE-588)4432990-8 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Elektronische Wahl Authentifikation Privatsphäre Kryptoanalyse Trusted Computing Sicherheitsprotokoll Konferenzschrift 2009 Cambridge |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4240472&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025769273&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT christiansonbruce securityprotocolsxvii17thinternationalworkshopcambridgeukapril132009revisedselectedpapers AT internationalworkshoponsecurityprotocolscambridge securityprotocolsxvii17thinternationalworkshopcambridgeukapril132009revisedselectedpapers |