Cryptology and network security: 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8257 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVIII, 348 S.) graph. Darst. |
ISBN: | 9783319029368 9783319029375 |
DOI: | 10.1007/978-3-319-02937-5 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041583066 | ||
003 | DE-604 | ||
005 | 20140317 | ||
007 | cr|uuu---uuuuu | ||
008 | 140122s2013 xx d||| o|||| 10||| eng d | ||
020 | |a 9783319029368 |9 978-3-319-02936-8 | ||
020 | |a 9783319029375 |c eISBN |9 978-3-319-02937-5 | ||
024 | 7 | |a 10.1007/978-3-319-02937-5 |2 doi | |
035 | |a (OCoLC)862045792 | ||
035 | |a (DE-599)BVBBV041583066 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.82 | |
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Cryptology and network security |b 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings |c Michel Abdalla ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XVIII, 348 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8257 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Parati |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Abdalla, Michel |e Sonstige |0 (DE-588)1060115158 |4 oth | |
711 | 2 | |a CANS |n 12. |d 2013 |c Parati |j Sonstige |0 (DE-588)1044198893 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 8257 |w (DE-604)BV014880109 |9 8257 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-02937-5 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027028289 |
Datensatz im Suchindex
_version_ | 1820875551612600320 |
---|---|
adam_text |
CRYPTOLOGY AND NETWORK SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
CRYPTANALYSIS
ZERO-KNOWLEDGE PROTOCOLS
DISTRIBUTED PROTOCOLS
NETWORK SECURITY AND APPLICATIONS
ADVANCED CRYPTOGRAPHIC PRIMITIVES
VERIFIABLE COMPUTATION.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CRYPTOLOGY AND NETWORK SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 12TH INTERNATIONAL
CONFERENCE ON CRYPTOLOGY AND NETWORK SECURITY, CANS 2013, HELD IN
PARATY, BRAZIL, IN NOVEMBER 2013. THE 18 REVISED FULL PAPERS PRESENTED
TOGETHER WITH FOUR INVITED TALKS WERE CAREFULLY REVIEWED AND SELECTED
FROM 57 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON
CRYPTANALYSIS, ZERO-KNOWLEDGE PROTOCOLS, DISTRIBUTED PROTOCOLS, NETWORK
SECURITY AND APPLICATIONS, ADVANCED CRYPTOGRAPHIC PRIMITIVES, AND
VERIFIABLE COMPUTATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1060115158 |
building | Verbundindex |
bvnumber | BV041583066 |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)862045792 (DE-599)BVBBV041583066 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-02937-5 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041583066</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140317</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140122s2013 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319029368</subfield><subfield code="9">978-3-319-02936-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319029375</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-319-02937-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-02937-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862045792</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041583066</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology and network security</subfield><subfield code="b">12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings</subfield><subfield code="c">Michel Abdalla ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 348 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8257</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Parati</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abdalla, Michel</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1060115158</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">CANS</subfield><subfield code="n">12.</subfield><subfield code="d">2013</subfield><subfield code="c">Parati</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1044198893</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8257</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8257</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-02937-5</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027028289</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Parati gnd-content |
genre_facet | Konferenzschrift 2013 Parati |
id | DE-604.BV041583066 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:26Z |
institution | BVB |
institution_GND | (DE-588)1044198893 |
isbn | 9783319029368 9783319029375 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027028289 |
oclc_num | 862045792 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVIII, 348 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings Michel Abdalla ... (eds.) Cham [u.a.] Springer 2013 1 Online-Ressource (XVIII, 348 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8257 Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Parati gnd-content Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptoanalyse (DE-588)4830502-9 s Kryptosystem (DE-588)4209132-9 s Sicherheitsprotokoll (DE-588)4709127-7 s DE-604 Abdalla, Michel Sonstige (DE-588)1060115158 oth CANS 12. 2013 Parati Sonstige (DE-588)1044198893 oth Lecture notes in computer science 8257 (DE-604)BV014880109 8257 https://doi.org/10.1007/978-3-319-02937-5 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings |
title_auth | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings |
title_exact_search | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings |
title_full | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings Michel Abdalla ... (eds.) |
title_fullStr | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings Michel Abdalla ... (eds.) |
title_full_unstemmed | Cryptology and network security 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings Michel Abdalla ... (eds.) |
title_short | Cryptology and network security |
title_sort | cryptology and network security 12th international conference cans 2013 paraty brazil november 20 22 2013 proceedings |
title_sub | 12th international conference, CANS 2013, Paraty, Brazil, November 20 - 22, 2013 ; proceedings |
topic | Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Datensicherung Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Sicherheitsprotokoll Konferenzschrift 2013 Parati |
url | https://doi.org/10.1007/978-3-319-02937-5 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028289&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT abdallamichel cryptologyandnetworksecurity12thinternationalconferencecans2013paratybrazilnovember20222013proceedings AT cansparati cryptologyandnetworksecurity12thinternationalconferencecans2013paratybrazilnovember20222013proceedings |