Advances in information and computer security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8231 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 318 S. graph. Darst. |
ISBN: | 364241382X 9783642413827 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041407700 | ||
003 | DE-604 | ||
005 | 20140226 | ||
007 | t| | ||
008 | 131111s2013 gw d||| |||| 10||| eng d | ||
015 | |a 13,N38 |2 dnb | ||
016 | 7 | |a 1041597673 |2 DE-101 | |
020 | |a 364241382X |9 3-642-41382-X | ||
020 | |a 9783642413827 |c Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.) |9 978-3-642-41382-7 | ||
024 | 3 | |a 9783642413827 | |
028 | 5 | 2 | |a Best.-Nr.: 86327191 |
035 | |a (OCoLC)864499300 | ||
035 | |a (DE-599)DNB1041597673 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 462f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in information and computer security |b 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |c Kazuo Sakiyama ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XII, 318 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8231 | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Okinawa |2 gnd-content | |
689 | 0 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Sakiyama, Kazuo |d 1971- |e Sonstige |0 (DE-588)1043945539 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-41383-4 |
830 | 0 | |a Lecture notes in computer science |v 8231 |w (DE-604)BV000000607 |9 8231 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4437957&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026855069&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026855069 |
Datensatz im Suchindex
_version_ | 1820875517767712768 |
---|---|
adam_text |
TABLE OF CONTENTS
SOFTWARE AND SYSTEM SECURITY
SECURE LOG TRANSFER BY REPLACING A LIBRARY IN A VIRTUAL MACHINE 1
MASAYA SATO AND TOSHIHIRO YAMAUCHI
STATIC INTEGER OVERFLOW VULNERABILITY DETECTION IN WINDOWS BINARY 19
YI DENG, YANG ZHANG, LIANG CHENG, AND XIAOSHAN SUN
SOLVING GOOGLE'S CONTINUOUS AUDIO CAPTCHA WITH HMM-BASED
AUTOMATIC SPEECH RECOGNITION 36
SHOTARO SANO, TAKUMA OTSUKA, AND HIROSHI G. OKUNO
CONSTRUCTIONS OF ALMOST SECURE FLAMEPROOF CODES BASED ON SMALL-BIAS
PROBABILITY SPACES 53
JOSE MOREIRA, MARCEL FERNANDEZ, AND GRIGORY KABATIANSKY
CRYPTANALYSIS
DIFFERENTIAL POWER ANALYSIS OF MAC-KECCAK AT ANY KEY-LENGTH 68
MOSTAFA TAHA AND PATRICK SCHAUMONT
GENERIC STATE-RECOVERY AND FORGERY ATTACKS ON CHOPMD-MAC AND ON
NMAC/HMAC 83
YUSUKE NAITO, YU SASAKI, LEI WANG, AND KAN YASUDA
NEW PROPERTY OF DIFFUSION SWITCHING MECHANISM ON CLEFIA AND ITS
APPLICATION TO DFA 99
YOSUKE TODO AND YU SASAKI
IMPROVEMENT OF FAUGERE ET AL.'S METHOD TO SOLVE ECDLP 115
YUN-JU HUANG, CHRISTOPHE PETIT, NAOYUKI SHINOHARA, AND
TSUYOSHI TAKAGI
PRIVACY AND CLOUD COMPUTING
STATISTICS ON ENCRYPTED CLOUD DATA 133
FU-KUO TSENG, YUNG-HSIANG LIU, RONG-JAYE CHEN, AND
BAO-SHUH PAUL LIN
TOWARD PRACTICAL SEARCHABLE SYMMETRIC ENCRYPTION 151
WAKAHA OGATA, KEITA KOIWA, AKIRA KANAOKA, AND SHIN'ICHIRO MATSUO
HTTP://D-NB.INFO/1041597673
XII TABLE OF CONTENTS
UNCONDITIONALLY SECURE OBLIVIOUS TRANSFER FROM REAL NETWORK
BEHAVIOR 168
PAOLO PALMIERI AND OLIVIER PEREIRA
CRYPTOGRAPHICALLY-SECURE AND EFFICIENT REMOTE CANCELABLE BIOMETRICS
BASED ON PUBLIC-KEY HOMOMORPHIC ENCRYPTION 183
TAKATO HIRANO, MITSUHIRO HATTORI, TAKASHI ITO, AND NORI MATSUDA
PUBLIC KEY CRYPTOSYSTEMS
EFFICIENT* ALGORITHM FOR TATE PAIRING OF COMPOSITE ORDER 201
YUTARO KIYOMURA AND TSUYOSHI TAKAGI
HOW TO FACTOR JVI
AND WHEN PI = P2 MOD 2
L
217
KAORU KUROSAWA AND TAKUMA UEDA
ACHIEVING CHOSEN CIPHERTEXT SECURITY FROM DETECTABLE PUBLIC KEY
ENCRYPTION EFFICIENTLY VIA HYBRID ENCRYPTION 226
TAKAHIRO MATSUDA AND GOICHIRO HANAOKA
CRYPTANALYSIS OF THE QUATERNION RAINBOW 244
YASUFUMI HASHIMOTO
SECURITY PROTOCOLS
ON CHEATER IDENTIFIABLE SECRET SHARING SCHEMES SECURE AGAINST R USHING
ADVERSARY 258
B.UI XU, KIRILL MOROZOV, AND TSUYOSHI TAKAGI
ONE-ROUND AUTHENTICATED KEY EXCHANGE WITHOUT IMPLEMENTATION
TRICK 272
KAZUKI YONEYAMA
ATTACKS TO THE PROXY RE-ENCRYPTION SCHEMES FROM IWSEC2011 290
TOSHIYUKI ISSHIKI, MANH HA NGUYEN, AND KEISUKE TANAKA
GAME-THEORETIC SECURITY FOR BIT COMMITMENT 303
HARUNA HIGO, KEISUKE TANAKA, AND KENJI YASUNAGA
AUTHOR INDEX 319 |
any_adam_object | 1 |
author_GND | (DE-588)1043945539 |
building | Verbundindex |
bvnumber | BV041407700 |
classification_rvk | SS 4800 |
classification_tum | DAT 462f DAT 465f |
ctrlnum | (OCoLC)864499300 (DE-599)DNB1041597673 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041407700</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140226</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">131111s2013 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">13,N38</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1041597673</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">364241382X</subfield><subfield code="9">3-642-41382-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642413827</subfield><subfield code="c">Pb. : ca. EUR 57.78 (DE) (freier Pr.), ca. EUR 59.40 (AT) (freier Pr.), ca. sfr 72.00 (freier Pr.)</subfield><subfield code="9">978-3-642-41382-7</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642413827</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86327191</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864499300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1041597673</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in information and computer security</subfield><subfield code="b">8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings</subfield><subfield code="c">Kazuo Sakiyama ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 318 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8231</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Okinawa</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sakiyama, Kazuo</subfield><subfield code="d">1971-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1043945539</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-41383-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8231</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">8231</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4437957&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026855069&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026855069</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Okinawa gnd-content |
genre_facet | Konferenzschrift 2013 Okinawa |
id | DE-604.BV041407700 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:53Z |
institution | BVB |
isbn | 364241382X 9783642413827 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026855069 |
oclc_num | 864499300 |
open_access_boolean | |
owner | DE-83 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-91G DE-BY-TUM |
physical | XII, 318 S. graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) Berlin [u.a.] Springer 2013 XII, 318 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 8231 Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Okinawa gnd-content Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Privatsphäre (DE-588)4123980-5 s Computersicherheit (DE-588)4274324-2 s DE-604 Kryptologie (DE-588)4033329-2 s 1\p DE-604 Sakiyama, Kazuo 1971- Sonstige (DE-588)1043945539 oth Erscheint auch als Online-Ausgabe 978-3-642-41383-4 Lecture notes in computer science 8231 (DE-604)BV000000607 8231 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4437957&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026855069&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Lecture notes in computer science Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
title_auth | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
title_exact_search | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
title_full | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) |
title_fullStr | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) |
title_full_unstemmed | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) |
title_short | Advances in information and computer security |
title_sort | advances in information and computer security 8th international workshop on security iwsec 2013 okinawa japan november 18 20 2013 proceedings |
title_sub | 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
topic | Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Privatsphäre Kryptoanalyse Kryptosystem Computersicherheit Kryptologie Sicherheitsprotokoll Konferenzschrift 2013 Okinawa |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4437957&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026855069&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT sakiyamakazuo advancesininformationandcomputersecurity8thinternationalworkshoponsecurityiwsec2013okinawajapannovember18202013proceedings |