Information security and privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7959 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 435 S.) graph. Darst. |
ISBN: | 3642390587 9783642390593 |
DOI: | 10.1007/978-3-642-39059-3 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041413043 | ||
003 | DE-604 | ||
005 | 20140130 | ||
007 | cr|uuu---uuuuu | ||
008 | 131113s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 3642390587 |9 3-642-39058-7 | ||
020 | |a 9783642390593 |c eISBN |9 978-3-642-39059-3 | ||
024 | 7 | |a 10.1007/978-3-642-39059-3 |2 doi | |
024 | 3 | |a 9783642390586 | |
028 | 5 | 2 | |a Best.-Nr.: 86288505 |
035 | |a (OCoLC)855544099 | ||
035 | |a (DE-599)BVBBV041413043 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-739 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.82 |2 22//ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information security and privacy |b 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings |c Colin Boyd ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XI, 435 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7959 | |
650 | 0 | 7 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymisierung |0 (DE-588)4139362-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Brisbane |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 0 | 3 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | 4 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | 1 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |D s |
689 | 2 | 2 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 2 | 3 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 2 | 4 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 6 | |a Anonymisierung |0 (DE-588)4139362-4 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
700 | 1 | |a Boyd, Colin |d 1959- |e Sonstige |0 (DE-588)1036721086 |4 oth | |
711 | 2 | |a ACISP |n 18 |d 2013 |c Brisbane |j Sonstige |0 (DE-588)1036717933 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-39058-6 |
830 | 0 | |a Lecture notes in computer science |v 7959 |w (DE-604)BV014880109 |9 7959 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-39059-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026860292 |
Datensatz im Suchindex
_version_ | 1820875517788684288 |
---|---|
adam_text |
INFORMATION SECURITY AND PRIVACY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
ANALYSING THE IOBC AUTHENTICATED ENCRYPTION MODE
A CHOSEN IV RELATED KEY ATTACK ON GRAIN
CRYPTANALYSIS OF HELIX AND PHELIX REVISITED
TOWARD SEPARATING THE STRONG ADAPTIVE PSEUDO-FREENESS FROM THE STRONG
RSA ASSUMPTION
MINKOWSKI SUM BASED LATTICE CONSTRUCTION FOR MULTIVARIATE SIMULTANEOUS
COPPERSMITH'S TECHNIQUE AND APPLICATIONS TO RSA
LATTICES AND SECURITY PROOFS
ADAPTIVE PRECISION FLOATING POINT LL
BETTER LATTICE CONSTRUCTIONS FOR SOLVING MULTIVARIATE LINEAR EQUATIONS
MODULO UNKNOWN DIVISORS
KEY-DEPENDENT MESSAGE CHOSEN-CIPHERTEXT SECURITY OF THE CRAMER-SHOUP
CRYPTOSYSTEM
BLACK-BOX SEPARATIONS AND THEIR ADAPTABILITY TO THE NON-UNIFORM MODEL
INJECTIVE ENCODINGS TO ELLIPTIC CURVES
MEMBERSHIP ENCRYPTION AND ITS APPLICATIONS
TOWARDS PRIVACY PRESERVING MOBILE INTERNET COMMUNICATIONS
COUNT-MIN SKETCHES FOR ESTIMATING PASSWORD FREQUENCY WITH HAMMING
DISTANCE
SECRET SHARING
A RATIONAL SECRET SHARING PROTOCOL WITH UNCONDITIONAL SECURITY IN THE
SYNCHRONOUS SETTING
SECRET SHARING SCHEMES WITH CONVERSION PROTOCOL TO ACHIEVE SHORT
SHARE-SIZE AND EXTENDIBILITY TO MULTIPARTY COMPUTATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION SECURITY AND PRIVACY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED CONFERENCE PROCEEDINGS OF THE 18TH
AUSTRALASIAN CONFERENCE ON INFORMATION SECURITY AND PRIVACY, ACISP 2013,
HELD IN BRISBANE, AUSTRALIA, IN JULY 2013. THE 28 REVISED FULL PAPERS
PRESENTED WERE CAREFULLY SELECTED FROM 78 SUBMISSIONS. CONFERENCE PAPERS
ARE ORGANIZED IN TECHNICAL SESSIONS, COVERING TOPICS OF CRYPTOANALYSIS,
RSA, LATTICES AND SECURITY PROOFS, PUBLIC KEY CRYPTOGRAPHY, HASHING,
SIGNATURES, PASSWORDS, MOBILE SECURITY, AND SECRET SHARING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1036721086 |
building | Verbundindex |
bvnumber | BV041413043 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)855544099 (DE-599)BVBBV041413043 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-39059-3 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041413043</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140130</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131113s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642390587</subfield><subfield code="9">3-642-39058-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642390593</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-39059-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-39059-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642390586</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86288505</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)855544099</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041413043</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and privacy</subfield><subfield code="b">18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings</subfield><subfield code="c">Colin Boyd ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 435 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7959</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Brisbane</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="6"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Boyd, Colin</subfield><subfield code="d">1959-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1036721086</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACISP</subfield><subfield code="n">18</subfield><subfield code="d">2013</subfield><subfield code="c">Brisbane</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1036717933</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-39058-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7959</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7959</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-39059-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026860292</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Brisbane gnd-content |
genre_facet | Konferenzschrift 2013 Brisbane |
id | DE-604.BV041413043 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:54Z |
institution | BVB |
institution_GND | (DE-588)1036717933 |
isbn | 3642390587 9783642390593 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026860292 |
oclc_num | 855544099 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-739 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-739 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 435 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings Colin Boyd ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XI, 435 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7959 Private-Key-Kryptosystem (DE-588)4317451-6 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Anonymisierung (DE-588)4139362-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Brisbane gnd-content Kryptoanalyse (DE-588)4830502-9 s Authentifikation (DE-588)4330656-1 s Hash-Algorithmus (DE-588)4323071-4 s Public-Key-Kryptosystem (DE-588)4209133-0 s Elektronische Unterschrift (DE-588)4269037-7 s DE-604 Kryptologie (DE-588)4033329-2 s Private-Key-Kryptosystem (DE-588)4317451-6 s Sicherheitsprotokoll (DE-588)4709127-7 s Computersicherheit (DE-588)4274324-2 s Anonymisierung (DE-588)4139362-4 s 1\p DE-604 Boyd, Colin 1959- Sonstige (DE-588)1036721086 oth ACISP 18 2013 Brisbane Sonstige (DE-588)1036717933 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-39058-6 Lecture notes in computer science 7959 (DE-604)BV014880109 7959 https://doi.org/10.1007/978-3-642-39059-3 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings Lecture notes in computer science Private-Key-Kryptosystem (DE-588)4317451-6 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anonymisierung (DE-588)4139362-4 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Authentifikation (DE-588)4330656-1 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4317451-6 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4139362-4 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)4209133-0 (DE-588)4330656-1 (DE-588)4323071-4 (DE-588)4269037-7 (DE-588)1071861417 |
title | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings |
title_auth | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings |
title_exact_search | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings |
title_full | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings Colin Boyd ... (eds.) |
title_fullStr | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings Colin Boyd ... (eds.) |
title_full_unstemmed | Information security and privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings Colin Boyd ... (eds.) |
title_short | Information security and privacy |
title_sort | information security and privacy 18th australasian conference acisp 2013 brisbane australia july 1 3 2013 proceedings |
title_sub | 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1 - 3, 2013 ; proceedings |
topic | Private-Key-Kryptosystem (DE-588)4317451-6 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anonymisierung (DE-588)4139362-4 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Authentifikation (DE-588)4330656-1 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Private-Key-Kryptosystem Kryptoanalyse Computersicherheit Anonymisierung Kryptologie Sicherheitsprotokoll Public-Key-Kryptosystem Authentifikation Hash-Algorithmus Elektronische Unterschrift Konferenzschrift 2013 Brisbane |
url | https://doi.org/10.1007/978-3-642-39059-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026860292&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT boydcolin informationsecurityandprivacy18thaustralasianconferenceacisp2013brisbaneaustraliajuly132013proceedings AT acispbrisbane informationsecurityandprivacy18thaustralasianconferenceacisp2013brisbaneaustraliajuly132013proceedings |