Lightweight cryptography for security and privacy: 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8162 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 141 S.) graph. Darst. |
ISBN: | 9783642403910 9783642403927 3642403913 |
DOI: | 10.1007/978-3-642-40392-7 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041437464 | ||
003 | DE-604 | ||
005 | 20210319 | ||
007 | cr|uuu---uuuuu | ||
008 | 131122s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 9783642403910 |c Print |9 978-3-642-40391-0 | ||
020 | |a 9783642403927 |c Online |9 978-3-642-40392-7 | ||
020 | |a 3642403913 |9 3-642-40391-3 | ||
024 | 7 | |a 10.1007/978-3-642-40392-7 |2 doi | |
024 | 3 | |a 9783642403910 | |
028 | 5 | 2 | |a Best.-Nr.: 86301814 |
035 | |a (OCoLC)874377893 | ||
035 | |a (DE-599)BVBBV041437464 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-739 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-355 | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Lightweight cryptography for security and privacy |b 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |c Gildas Avoine ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (X, 141 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8162 | |
650 | 0 | 7 | |a Blockchiffre |0 (DE-588)4323693-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 06.05.2013-07.05.2013 |z Gebze |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Blockchiffre |0 (DE-588)4323693-5 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Avoine, Gildas |0 (DE-588)1207165204 |4 edt | |
711 | 2 | |a LightSec |n 2 |d 2013 |c Gebze |j Sonstige |0 (DE-588)1041631723 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 8162 |w (DE-604)BV014880109 |9 8162 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-40392-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026884300 |
Datensatz im Suchindex
_version_ | 1820875537344626688 |
---|---|
adam_text |
LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
EFFICIENT IMPLEMENTATIONS AND DESIGNS
A LIGHTWEIGHT ATMEGA-BASED APPLICATION-SPECIFIC INSTRUCTION-SET
PROCESSOR FOR ELLIPTIC CURVE CRYPTOGRAPHY
ITUBEE: A SOFTWARE ORIENTED LIGHTWEIGHT BLOCK CIPHER
BLOCK CIPHER CRYPTANALYSIS
RELATED-KEY SLIDE ATTACKS ON BLOCK CIPHERS WITH SECRET COMPONENTS
DIFFERENTIAL FAULT ATTACK ON THE PRINCE BLOCK CIPHER
MULTIDIMENSIONAL MEET-IN-THE-MIDDLE ATTACKS ON REDUCED-ROUND TWINE-128
WIRELESS SENSOR NETWORKS
AN IMPLEMENTATION OF THE HASH-CHAIN SIGNATURE SCHEME FOR WIRELESS SENSOR
NETWORKS
AN ADAPTIVE SECURITY ARCHITECTURE FOR LOCATION PRIVACY SENSITIVE SENSOR
NETWORK APPLICATIONS
CRYPTOGRAPHIC PROTOCOLS
SECURE & LIGHTWEIGHT DISTANCE-BOUNDING
CRYPTANALYSIS AND IMPROVEMENT OF A PROVABLY SECURE RFID OWNERSHIP
TRANSFER PROTOCOL
AN EFFICIENT AND PRIVATE RFID AUTHENTICATION PROTOCOL SUPPORTING
OWNERSHIP TRANSFER
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE PROCEEDINGS OF THE 2TH INTERNATIONAL WORKSHOP
ON LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2013,
HELD IN GEBZE, TURKEY, DURING MAY 6-7, 2013. THE 10 FULL PAPERS
PRESENTED TOGETHER WITH 3 INVITED TALKS WERE CAREFULLY REVIEWED AND
SELECTED FROM 27 SUBMISSIONS. THE PAPERS ARE GROUPED IN TOPICAL SECTIONS
ON EFFICIENT IMPLEMENTATIONS AND DESIGNS, BLOCK CIPHER CRYPTANALYSIS,
WIRELESS SENSOR NETWORKS, AND CRYPTOGRAPHIC PROTOCOLS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Avoine, Gildas |
author2_role | edt |
author2_variant | g a ga |
author_GND | (DE-588)1207165204 |
author_facet | Avoine, Gildas |
building | Verbundindex |
bvnumber | BV041437464 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)874377893 (DE-599)BVBBV041437464 |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-40392-7 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041437464</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210319</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131122s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642403910</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-642-40391-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642403927</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-40392-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642403913</subfield><subfield code="9">3-642-40391-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-40392-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642403910</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86301814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874377893</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041437464</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Lightweight cryptography for security and privacy</subfield><subfield code="b">2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers</subfield><subfield code="c">Gildas Avoine ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 141 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8162</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">06.05.2013-07.05.2013</subfield><subfield code="z">Gebze</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Blockchiffre</subfield><subfield code="0">(DE-588)4323693-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Avoine, Gildas</subfield><subfield code="0">(DE-588)1207165204</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">LightSec</subfield><subfield code="n">2</subfield><subfield code="d">2013</subfield><subfield code="c">Gebze</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1041631723</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8162</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8162</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-40392-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026884300</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 06.05.2013-07.05.2013 Gebze gnd-content |
genre_facet | Konferenzschrift 06.05.2013-07.05.2013 Gebze |
id | DE-604.BV041437464 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:12Z |
institution | BVB |
institution_GND | (DE-588)1041631723 |
isbn | 9783642403910 9783642403927 3642403913 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026884300 |
oclc_num | 874377893 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-739 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-739 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (X, 141 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (X, 141 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8162 Blockchiffre (DE-588)4323693-5 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 06.05.2013-07.05.2013 Gebze gnd-content Computersicherheit (DE-588)4274324-2 s Privatsphäre (DE-588)4123980-5 s Blockchiffre (DE-588)4323693-5 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s 1\p DE-604 Avoine, Gildas (DE-588)1207165204 edt LightSec 2 2013 Gebze Sonstige (DE-588)1041631723 oth Lecture notes in computer science 8162 (DE-604)BV014880109 8162 https://doi.org/10.1007/978-3-642-40392-7 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Lecture notes in computer science Blockchiffre (DE-588)4323693-5 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4323693-5 (DE-588)4123980-5 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
title_auth | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
title_exact_search | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
title_full | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) |
title_fullStr | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) |
title_full_unstemmed | Lightweight cryptography for security and privacy 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers Gildas Avoine ... (eds.) |
title_short | Lightweight cryptography for security and privacy |
title_sort | lightweight cryptography for security and privacy 2nd international workshop lightsec 2013 gebze turkey may 6 7 2013 revised selected papers |
title_sub | 2nd international workshop, LightSec 2013, Gebze, Turkey, May 6 - 7, 2013 ; revised selected papers |
topic | Blockchiffre (DE-588)4323693-5 gnd Privatsphäre (DE-588)4123980-5 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Blockchiffre Privatsphäre Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Konferenzschrift 06.05.2013-07.05.2013 Gebze |
url | https://doi.org/10.1007/978-3-642-40392-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026884300&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT avoinegildas lightweightcryptographyforsecurityandprivacy2ndinternationalworkshoplightsec2013gebzeturkeymay672013revisedselectedpapers AT lightsecgebze lightweightcryptographyforsecurityandprivacy2ndinternationalworkshoplightsec2013gebzeturkeymay672013revisedselectedpapers |