Applied cryptography and network security: 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7954 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XIV, 572 S.) |
ISBN: | 3642389791 9783642389795 9783642389801 |
DOI: | 10.1007/978-3-642-38980-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041406989 | ||
003 | DE-604 | ||
005 | 20140130 | ||
007 | cr|uuu---uuuuu | ||
008 | 131111s2013 xx o|||| 10||| eng d | ||
020 | |a 3642389791 |c : Pb. : ca. EUR 74.90 (DE) |9 3-642-38979-1 | ||
020 | |a 9783642389795 |c : Pb. : ca. EUR 74.90 (DE) |9 978-3-642-38979-5 | ||
020 | |a 9783642389801 |c eISBN |9 978-3-642-38980-1 | ||
024 | 7 | |a 10.1007/978-3-642-38980-1 |2 doi | |
035 | |a (OCoLC)855544164 | ||
035 | |a (DE-599)BVBBV041406989 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Applied cryptography and network security |b 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings |c Michael Jacobson ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XIV, 572 S.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7954 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Banff Alberta |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Jacobson, Michael J. |d 1971- |e Sonstige |0 (DE-588)121455610 |4 oth | |
711 | 2 | |a ACNS |n 11 |d 2013 |c Banff, Alberta |j Sonstige |0 (DE-588)1036791815 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7954 |w (DE-604)BV014880109 |9 7954 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-38980-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026854376 |
Datensatz im Suchindex
_version_ | 1820875517763518464 |
---|---|
adam_text |
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CLOUD CRYPTOGRAPHY
SECURE COMPUTATION
HASH FUNCTION AND BLOCK CIPHER
SIGNATURE
SYSTEM ATTACK
SECURE IMPLEMENTATION - HARDWARE
SECURE IMPLEMENTATION-SOFTWARE
GROUP-ORIENTED SYSTEMS
KEY EXCHANGE AND LEAKAGE RESILIENCE
CRYPTOGRAPHIC PROOF
CRYPTOSYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 11TH INTERNATIONAL
CONFERENCE ON APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2013, HELD
IN BANFF, CANADA, IN JUNE 2013. THE 33 REVISED FULL PAPERS INCLUDED IN
THIS VOLUME WERE CAREFULLY REVIEWED AND SELECTED FROM 192 SUBMISSIONS.
THEY ARE ORGANIZED IN TOPICAL SECTIONS ON CLOUD CRYPTOGRAPHY; SECURE
COMPUTATION; HASH FUNCTION AND BLOCK CIPHER; SIGNATURE; SYSTEM ATTACK;
SECURE IMPLEMENTATION - HARDWARE; SECURE IMPLEMENTATION - SOFTWARE;
GROUP-ORIENTED SYSTEMS; KEY EXCHANGE AND LEAKAGE RESILIENCE;
CRYPTOGRAPHIC PROOF; CRYPTOSYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)121455610 |
building | Verbundindex |
bvnumber | BV041406989 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)855544164 (DE-599)BVBBV041406989 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-38980-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041406989</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140130</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131111s2013 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642389791</subfield><subfield code="c">: Pb. : ca. EUR 74.90 (DE)</subfield><subfield code="9">3-642-38979-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642389795</subfield><subfield code="c">: Pb. : ca. EUR 74.90 (DE)</subfield><subfield code="9">978-3-642-38979-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642389801</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-38980-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-38980-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)855544164</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041406989</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied cryptography and network security</subfield><subfield code="b">11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings</subfield><subfield code="c">Michael Jacobson ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIV, 572 S.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7954</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Banff Alberta</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jacobson, Michael J.</subfield><subfield code="d">1971-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)121455610</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACNS</subfield><subfield code="n">11</subfield><subfield code="d">2013</subfield><subfield code="c">Banff, Alberta</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1036791815</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7954</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7954</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-38980-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026854376</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Banff Alberta gnd-content |
genre_facet | Konferenzschrift 2013 Banff Alberta |
id | DE-604.BV041406989 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:16:53Z |
institution | BVB |
institution_GND | (DE-588)1036791815 |
isbn | 3642389791 9783642389795 9783642389801 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026854376 |
oclc_num | 855544164 |
open_access_boolean | |
owner | DE-739 DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-739 DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIV, 572 S.) |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings Michael Jacobson ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XIV, 572 S.) txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7954 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Banff Alberta gnd-content Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s DE-604 Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Jacobson, Michael J. 1971- Sonstige (DE-588)121455610 oth ACNS 11 2013 Banff, Alberta Sonstige (DE-588)1036791815 oth Lecture notes in computer science 7954 (DE-604)BV014880109 7954 https://doi.org/10.1007/978-3-642-38980-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings |
title_auth | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings |
title_exact_search | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings |
title_full | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings Michael Jacobson ... (eds.) |
title_fullStr | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings Michael Jacobson ... (eds.) |
title_full_unstemmed | Applied cryptography and network security 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings Michael Jacobson ... (eds.) |
title_short | Applied cryptography and network security |
title_sort | applied cryptography and network security 11th international conference acns 2013 banff ab canada june 25 28 2013 proceedings |
title_sub | 11th international conference, ACNS 2013, Banff, AB, Canada, June 25 - 28, 2013 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Datensicherung Rechnernetz Kryptoanalyse Kryptosystem Computersicherheit Kryptologie Konferenzschrift 2013 Banff Alberta |
url | https://doi.org/10.1007/978-3-642-38980-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026854376&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT jacobsonmichaelj appliedcryptographyandnetworksecurity11thinternationalconferenceacns2013banffabcanadajune25282013proceedings AT acnsbanffalberta appliedcryptographyandnetworksecurity11thinternationalconferenceacns2013banffabcanadajune25282013proceedings |