Security protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7028 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (IX, 364 S.) Ill., graph. Darst. |
ISBN: | 9783642362125 3642362125 9783642362132 |
DOI: | 10.1007/978-3-642-36213-2 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040914825 | ||
003 | DE-604 | ||
005 | 20150113 | ||
007 | cr|uuu---uuuuu | ||
008 | 130327s2013 gw ad|| o|||| 00||| eng d | ||
020 | |a 9783642362125 |9 978-3-642-36212-5 | ||
020 | |a 3642362125 |9 3-642-36212-5 | ||
020 | |a 9783642362132 |c eISBN |9 978-3-642-36213-2 | ||
024 | 7 | |a 10.1007/978-3-642-36213-2 |2 doi | |
035 | |a (OCoLC)830902101 | ||
035 | |a (DE-599)BVBBV040914825 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.82 | |
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Security protocols XVII |b 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |c Bruce Christianson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (IX, 364 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7028 | |
650 | 0 | 7 | |a Elektronische Wahl |0 (DE-588)4432990-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Cambridge |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Elektronische Wahl |0 (DE-588)4432990-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Christianson, Bruce |d 1958- |e Sonstige |0 (DE-588)1064909507 |4 oth | |
711 | 2 | |a International Workshop on Security Protocols |n 17 |d 2009 |c Cambridge |j Sonstige |0 (DE-588)1031963332 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7028 |w (DE-604)BV014880109 |9 7028 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-36213-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025894076 |
Datensatz im Suchindex
_version_ | 1820875450504708096 |
---|---|
adam_text |
SECURITY PROTOCOLS XVII
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
EVOLUTIONARY DESIGN OF ATTACK STRATEGIES
BELOW THE SALT
ATTACKING EACH OTHER
BRINGING ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE TO PRACTICE
TOWARDS A VERIFIED REFERENCE IMPLEMENTATION OF A TRUSTED PLATFORM MODULE
PRETTY GOOD DEMOCRACY
BRIEF ENCOUNTERS WITH A RANDOM KEY GRAPH
WHY I'M NOT AN ENTROPIST
A NOVEL STATELESS AUTHENTICATION PROTOCOL
ESTABLISHING DISTRIBUTED HIDDEN FRIENDSHIP RELATIONS
THE FINAL WORD
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURITY PROTOCOLS XVII
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-PROCEEDINGS OF THE
17TH INTERNATIONAL WORKSHOP ON SECURITY PROTOCOLS, SP 2009, HELD IN
CAMBRIDGE, UK, IN APRIL 2009. THE 17 REVISED FULL PAPERS PRESENTED
TOGETHER WITH EDITED TRANSCRIPTIONS OF SOME OF THE DISCUSSIONS FOLLOWING
THE PRESENTATIONS HAVE GONE THROUGH MULTIPLE ROUNDS OF REVIEWING,
REVISION, AND SELECTION. THE THEME OF THIS WORKSHOP WAS "BRIEF
ENCOUNTERS". IN THE OLD DAYS, SECURITY PROTOCOLS WERE TYPICALLY RUN
FIRST AS PRELIMINARIES TO, AND LATER TO MAINTAIN, RELATIVELY STABLE
CONTINUING RELATIONSHIPS BETWEEN RELATIVELY UNCHANGING INDIVIDUAL
ENTITIES. PERVASIVE COMPUTING, E-BAY AND SECOND LIFE HAVE SHIFTED THE
GROUND: WE NOW FREQUENTLY DESIRE A SECURE COMMITMENT TO A PARTICULAR
COMMUNITY OF ENTITIES, BUT RELATIVELY TRANSIENT RELATIONSHIPS WITH
INDIVIDUAL MEMBERS OF IT, AND WE ARE OFTEN MORE INTERESTED IN VALIDATING
ATTRIBUTES THAN IDENTITY. THE PAPERS AND DISCUSSIONS IN THIS VOLUME
EXAMINE THE THEME FROM THE STANDPOINT OF VARIOUS DIFFERENT APPLICATIONS
AND ADVERSARIES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1064909507 |
building | Verbundindex |
bvnumber | BV040914825 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 000 DAT 465f |
collection | ZDB-2-LNC ZDB-2-SCS |
ctrlnum | (OCoLC)830902101 (DE-599)BVBBV040914825 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-36213-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040914825</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130327s2013 gw ad|| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642362125</subfield><subfield code="9">978-3-642-36212-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642362125</subfield><subfield code="9">3-642-36212-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642362132</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-36213-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-36213-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)830902101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040914825</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols XVII</subfield><subfield code="b">17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers</subfield><subfield code="c">Bruce Christianson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 364 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7028</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Wahl</subfield><subfield code="0">(DE-588)4432990-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Elektronische Wahl</subfield><subfield code="0">(DE-588)4432990-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security Protocols</subfield><subfield code="n">17</subfield><subfield code="d">2009</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1031963332</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7028</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7028</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-36213-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025894076</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Cambridge gnd-content |
genre_facet | Konferenzschrift 2009 Cambridge |
id | DE-604.BV040914825 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:49Z |
institution | BVB |
institution_GND | (DE-588)1031963332 |
isbn | 9783642362125 3642362125 9783642362132 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025894076 |
oclc_num | 830902101 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-Aug4 DE-859 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-Aug4 DE-859 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (IX, 364 S.) Ill., graph. Darst. |
psigel | ZDB-2-LNC ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (IX, 364 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7028 Elektronische Wahl (DE-588)4432990-8 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Cambridge gnd-content Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Kryptoanalyse (DE-588)4830502-9 s Elektronische Wahl (DE-588)4432990-8 s DE-604 Christianson, Bruce 1958- Sonstige (DE-588)1064909507 oth International Workshop on Security Protocols 17 2009 Cambridge Sonstige (DE-588)1031963332 oth Lecture notes in computer science 7028 (DE-604)BV014880109 7028 https://doi.org/10.1007/978-3-642-36213-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Lecture notes in computer science Elektronische Wahl (DE-588)4432990-8 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4432990-8 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)7562931-8 (DE-588)4709127-7 (DE-588)1071861417 |
title | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
title_auth | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
title_exact_search | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
title_full | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) |
title_fullStr | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) |
title_full_unstemmed | Security protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers Bruce Christianson ... (eds.) |
title_short | Security protocols XVII |
title_sort | security protocols xvii 17th international workshop cambridge uk april 1 3 2009 revised selected papers |
title_sub | 17th International Workshop, Cambridge, UK, April 1-3, 2009 ; revised selected papers |
topic | Elektronische Wahl (DE-588)4432990-8 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Elektronische Wahl Authentifikation Privatsphäre Kryptoanalyse Trusted Computing Sicherheitsprotokoll Konferenzschrift 2009 Cambridge |
url | https://doi.org/10.1007/978-3-642-36213-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025894076&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT christiansonbruce securityprotocolsxvii17thinternationalworkshopcambridgeukapril132009revisedselectedpapers AT internationalworkshoponsecurityprotocolscambridge securityprotocolsxvii17thinternationalworkshopcambridgeukapril132009revisedselectedpapers |