Provable security: 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in Computer science
8209 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | X, 346 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 3642412262 9783642412264 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041377138 | ||
003 | DE-604 | ||
005 | 20151001 | ||
007 | t| | ||
008 | 131023s2013 gw d||| |||| 10||| eng d | ||
015 | |a 13,N36 |2 dnb | ||
016 | 7 | |a 1038868084 |2 DE-101 | |
020 | |a 3642412262 |9 3-642-41226-2 | ||
020 | |a 9783642412264 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-41226-4 | ||
024 | 3 | |a 9783642412264 | |
028 | 5 | 2 | |a Best.-Nr.: 86325597 |
035 | |a (OCoLC)864546795 | ||
035 | |a (DE-599)DNB1038868084 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-11 |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Provable security |b 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings |c Willy Susilo ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a X, 346 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in Computer science |v 8209 | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Interaktives Beweissystem |0 (DE-588)4648334-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselaustauschprotokoll |0 (DE-588)1029440018 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Beweisbarkeit |0 (DE-588)7578966-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Malakka Stadt |2 gnd-content | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Malakka Stadt |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Schlüsselaustauschprotokoll |0 (DE-588)1029440018 |D s |
689 | 0 | 6 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 0 | 7 | |a Beweisbarkeit |0 (DE-588)7578966-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 3 | |a Interaktives Beweissystem |0 (DE-588)4648334-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 3 | 3 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 3 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 3 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | 6 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 3 | 7 | |a Interaktives Beweissystem |0 (DE-588)4648334-2 |D s |
689 | 3 | |8 1\p |5 DE-604 | |
689 | 4 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 5 | |5 DE-604 | |
700 | 1 | |a Susilo, Willy |e Sonstige |4 oth | |
711 | 2 | |a ProvSec |n 7 |d 2013 |c Malakka |j Sonstige |0 (DE-588)1043308008 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-41227-1 |
830 | 0 | |a Lecture notes in Computer science |v 8209 |w (DE-604)BV000000607 |9 8209 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4431340&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026825176&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026825176 |
Datensatz im Suchindex
_version_ | 1820875475815235584 |
---|---|
adam_text |
TABLE OF CONTENTS
INVITED TALK
ON MODELING TERRORIST FRAUDS: ADDRESSING COLLUSION IN DISTANCE
BOUNDING PROTOCOLS 1
SERGE VAUDENAY
KEY EXCHANGE PROTOCOLS
AUTHENTICATED KEY EXCHANGE PROTOCOLS BASED 011
FACTORING
ASSUMPTION 21
HAI HUANG
EFFICIENT, PAIRING-FREE, AUTHENTICATED IDENTITY BASED KEY AGREEMENT
IN A SINGLE ROUND 38
S. SREE VIVEK, S. SHARMILA DEVA SELVI,
LAYAMRUDHAA R.ENGANATHAN VENKATESAN, AND
C. PANDU B.ANGAN
CIL SECURITY PROOF FOR A PASSWORD-BASED KEY EXCHANGE 59
CRISTIAN ENE, CLEMENTINE GRITTI, AND YASSINE LAKHNECH
SECURITY MODELS
NON OBSERVABILITY IN THE RANDOM ORACLE MODEL 86
PRABHANJAN ANANTH AND RAGHAV BHASKAR
INDISTINGUISHABILITY AGAINST CHOSEN CIPHERTEXT VERIFICATION ATTACK
REVISITED: THE COMPLETE PICTURE 104
ANGSUMAN DAS, SABYASACHI DUTTA, AND AVISHEK ADHIKAN
INPUT-AWARE EQUIVOCABLE COMMITMENTS AND UC-SECURE COMMITMENTS
WITH ATOMIC EXCHANGES 121
IOANA BOUREANU AND SERGE VAUDENAY
TOWARDS ANONYMOUS CIPHERTEXT INDISTINGUISHABILITY WITH IDENTITY
LEAKAGE 139
TSZ HON YUEN, CONG ZHANG, SHERMAN S.M. CHOW, AND JOSEPH K. LIU
SIGNATURE AND SIGNCRYPTION SCHEMES
/C-TIME PROXY SIGNATURE: FORMAL DEFINITION AND EFFICIENT
CONSTRUCTION 154
WEIWEI LIU, GUOMIN YANG, YI MU, AND JIANNAN WEI
HTTP://D-NB.INFO/1038868084
X TABLE OF CONTENTS
ANONYMOUS SIGNCRYPTION AGAINST LINEAR RELATED-KEY ATTACKS 165
HUI CUI, YI MU, AND MAN HO AU
AUTHENTICATED ENCRYPTION
IMPROVED AUTHENTICITY BOUND OF EAX, AND REFINEMENTS 184
KAZUHIKO MINEMATSU, STEFAN LUCKS, AND TETSU IWATA
THE SECURITY OF THE OCB MODE OF OPERATION WITHOUT THE SPRP
ASSUMPTION 202
KAZUMARO AOKI AND KAN YASUDA
A SHORT UNIVERSAL HASH FUNCTION FROM BIT ROTATION, AND APPLICATIONS
TO BLOCKCIPHER MODES 221
KAZUHIKO MINEMATSU
THEORY
HOW TO REMOVE THE EXPONENT GCD IN HK09 239
XIANHUI LU, BAO LI, AND YAMIN LIU
TRANSLATION-R.ANDOMIZABLE DISTRIBUTIONS VIA RANDOM WALKS 249
NIRATTAYA KHAMSEMANAN AND WILLIAM E. SKEITH III
PUBLIC KEY ENCRYPTION
R.KA SECURE PKE BASED ON THE DDH AND HR, ASSUMPTIONS 271
DINGDING JIA, XIANHUI LU, BAO LI, AND QIXIANG MEI
COMPUTATIONALLY EFFICIENT DUAL-POLICY ATTRIBUTE BASED ENCRYPTION
WITH SHORT CIPHERTEXT 288
Y. SREENIVASA RAO AND R.ATNA DUTTA
FACTORING-BASED PROXY RE-ENCRYPTION SCHEMES 309
TOSHIYUKI ISSLIIKI, MANH HA NGUYEN, AND KEISUKE TANAKA
TOWARDS A SECURE CERTIFICATELESS PROXY R.E-ENCRYPTION SCHEME 330
HUI GUO, ZHENFENG ZHANG, JIANG ZHANG, AND CHENG CHEN
AUTHOR INDEX
347 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041377138 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)864546795 (DE-599)DNB1038868084 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041377138</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151001</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">131023s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N36</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1038868084</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642412262</subfield><subfield code="9">3-642-41226-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642412264</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-41226-4</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642412264</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86325597</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864546795</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1038868084</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Provable security</subfield><subfield code="b">7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings</subfield><subfield code="c">Willy Susilo ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 346 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in Computer science</subfield><subfield code="v">8209</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Malakka Stadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Malakka Stadt</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="6"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="7"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susilo, Willy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ProvSec</subfield><subfield code="n">7</subfield><subfield code="d">2013</subfield><subfield code="c">Malakka</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1043308008</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-41227-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in Computer science</subfield><subfield code="v">8209</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8209</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4431340&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026825176&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026825176</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Malakka Stadt gnd-content (DE-588)1071861417 Konferenzschrift 2013 Malakka Stadt gnd-content |
genre_facet | Konferenzschrift 2010 Malakka Stadt Konferenzschrift 2013 Malakka Stadt |
id | DE-604.BV041377138 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:13Z |
institution | BVB |
institution_GND | (DE-588)1043308008 |
isbn | 3642412262 9783642412264 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026825176 |
oclc_num | 864546795 |
open_access_boolean | |
owner | DE-11 DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-11 DE-83 DE-91G DE-BY-TUM |
physical | X, 346 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in Computer science |
series2 | Lecture notes in Computer science |
spelling | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings Willy Susilo ... (eds.) Berlin [u.a.] Springer 2013 X, 346 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in Computer science 8209 Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Interaktives Beweissystem (DE-588)4648334-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Schlüsselaustauschprotokoll (DE-588)1029440018 gnd rswk-swf Beweisbarkeit (DE-588)7578966-8 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Malakka Stadt gnd-content (DE-588)1071861417 Konferenzschrift 2013 Malakka Stadt gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s Kryptosystem (DE-588)4209132-9 s Schlüsselaustauschprotokoll (DE-588)1029440018 s Elektronische Unterschrift (DE-588)4269037-7 s Beweisbarkeit (DE-588)7578966-8 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Interaktives Beweissystem (DE-588)4648334-2 s Hash-Algorithmus (DE-588)4323071-4 s Sicherheitsprotokoll (DE-588)4709127-7 s 1\p DE-604 Susilo, Willy Sonstige oth ProvSec 7 2013 Malakka Sonstige (DE-588)1043308008 oth Erscheint auch als Online-Ausgabe 978-3-642-41227-1 Lecture notes in Computer science 8209 (DE-604)BV000000607 8209 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4431340&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026825176&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings Lecture notes in Computer science Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Interaktives Beweissystem (DE-588)4648334-2 gnd Datensicherung (DE-588)4011144-1 gnd Schlüsselaustauschprotokoll (DE-588)1029440018 gnd Beweisbarkeit (DE-588)7578966-8 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Chiffrierung (DE-588)4352893-4 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)4648334-2 (DE-588)4011144-1 (DE-588)1029440018 (DE-588)7578966-8 (DE-588)4323071-4 (DE-588)4352893-4 (DE-588)4269037-7 (DE-588)1071861417 |
title | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings |
title_auth | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings |
title_exact_search | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings |
title_full | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings Willy Susilo ... (eds.) |
title_fullStr | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings Willy Susilo ... (eds.) |
title_full_unstemmed | Provable security 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings Willy Susilo ... (eds.) |
title_short | Provable security |
title_sort | provable security 7th international conference provsec 2013 melaka malaysia october 23 25 2013 proceedings |
title_sub | 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23 - 25, 2013 ; proceedings |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Interaktives Beweissystem (DE-588)4648334-2 gnd Datensicherung (DE-588)4011144-1 gnd Schlüsselaustauschprotokoll (DE-588)1029440018 gnd Beweisbarkeit (DE-588)7578966-8 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Chiffrierung (DE-588)4352893-4 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Kryptoanalyse Kryptosystem Computersicherheit Kryptologie Sicherheitsprotokoll Interaktives Beweissystem Datensicherung Schlüsselaustauschprotokoll Beweisbarkeit Hash-Algorithmus Chiffrierung Elektronische Unterschrift Konferenzschrift 2010 Malakka Stadt Konferenzschrift 2013 Malakka Stadt |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4431340&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026825176&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT susilowilly provablesecurity7thinternationalconferenceprovsec2013melakamalaysiaoctober23252013proceedings AT provsecmalakka provablesecurity7thinternationalconferenceprovsec2013melakamalaysiaoctober23252013proceedings |