Advances in information and computer security: 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8231 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XII, 318 S.) graph. Darst. |
ISBN: | 364241382X 9783642413834 |
DOI: | 10.1007/978-3-642-41383-4 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041590109 | ||
003 | DE-604 | ||
005 | 20140226 | ||
007 | cr|uuu---uuuuu | ||
008 | 140127s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 364241382X |9 3-642-41382-X | ||
020 | |a 9783642413834 |c eISBN |9 978-3-642-41383-4 | ||
024 | 7 | |a 10.1007/978-3-642-41383-4 |2 doi | |
024 | 3 | |a 9783642413827 | |
028 | 5 | 2 | |a Best.-Nr.: 86327191 |
035 | |a (OCoLC)864499300 | ||
035 | |a (DE-599)BVBBV041590109 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 |2 22//ger | |
084 | |a DAT 462f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in information and computer security |b 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |c Kazuo Sakiyama ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XII, 318 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8231 | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Okinawa |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | 1 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | 3 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Sakiyama, Kazuo |d 1971- |e Sonstige |0 (DE-588)1043945539 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-41382-7 |
830 | 0 | |a Lecture notes in computer science |v 8231 |w (DE-604)BV014880109 |9 8231 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-41383-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027035191 |
Datensatz im Suchindex
_version_ | 1820875555668492288 |
---|---|
adam_text |
ADVANCES IN INFORMATION AND COMPUTER SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SOFTWARE AND SYSTEM SECURITY
SECURE LOG TRANSFER BY REPLACING A LIBRARY IN A VIRTUAL MACHINE
STATIC INTEGER OVERFLOW VULNERABILITY DETECTION IN WINDOWS BINARY
SOLVING GOOGLE’S CONTINUOUS AUDIO CAPTCHA WITH HMM-BASED AUTOMATIC
SPEECH RECOGNITION
CONSTRUCTIONS OF ALMOST SECURE FRAMEPROOF CODES BASED ON SMALL-BIAS
PROBABILITY SPACES
CRYPTANALYSIS
DIFFERENTIAL POWER ANALYSIS OF MAC-KECCAK AT ANY KEY-LENGTH
GENERIC STATE-RECOVERY AND FORGERY ATTACKS ON CHOPMD-MAC AND ON
NMAC/HMAC
NEW PROPERTY OF DIFFUSION SWITCHING MECHANISM ON CLEFIA AND ITS
APPLICATION TO DFA
IMPROVEMENT OF FAUG`ERE ET AL.’S METHOD TO SOLVE ECDLP
PRIVACY AND CLOUD COMPUTING
STATISTICS ON ENCRYPTED CLOUD DATA
TOWARD PRACTICAL SEARCHABLE SYMMETRIC ENCRYPTION
UNCONDITIONALLY SECURE OBLIVIOUS TRANSFER FROM REAL NETWORK BEHAVIOR
CRYPTOGRAPHICALLY-SECURE AND EFFICIENT REMOTE CANCELABLE BIOMETRICS
BASED ON PUBLIC-KEY HOMOMORPHIC ENCRYPTION
PUBLIC KEY CRYPTOSYSTEMS
EFFICIENT ALGORITHM FOR TATE PAIRING OF COMPOSITE ORDER
HOW TO FACTOR N1 AND N2 WHEN P1 = P2 MOD 2T
ACHIEVING CHOSEN CIPHERTEXT SECURITY FROM DETECTABLE PUBLIC KEY
ENCRYPTION EFFICIENTLY VIA HYBRID ENCRYPTION
CRYPTANALYSIS OF THE QUATERNION RAINBOW
SECURITY PROTOCOLS
ON CHEATER IDENTIFIABLE SECRET SHARING SCHEMES SECURE AGAINST RUSHING
ADVERSARY
ONE-ROUND AUTHENTICATED KEY EXCHANGE WITHOUT IMPLEMENTATION TRICK
ATTACKS TO THE PROXY RE-ENCRYPTION SCHEMES FROM IWSEC2011
GAME-THEORETIC SECURITY FOR BIT COMMITMENT
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
ADVANCES IN INFORMATION AND COMPUTER SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 8TH INTERNATIONAL
WORKSHOP ON SECURITY, IWSEC 2013, HELD IN OKINAWA, JAPAN, IN NOVEMBER
2013. THE 20 REVISED SELECTED PAPERS PRESENTED IN THIS VOLUME WERE
CAREFULLY REVIEWED AND SELECTED FROM 63 SUBMISSIONS. THEY ARE ORGANIZED
IN TOPICAL SECTIONS NAMED: SOFTWARE AND SYSTEM SECURITY, CRYPTANALYSIS,
PRIVACY AND CLOUD COMPUTING, PUBLIC KEY CRYPTOSYSTEMS, AND SECURITY
PROTOCOLS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1043945539 |
building | Verbundindex |
bvnumber | BV041590109 |
classification_rvk | SS 4800 |
classification_tum | DAT 462f DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)864499300 (DE-599)BVBBV041590109 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-41383-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041590109</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140226</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140127s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">364241382X</subfield><subfield code="9">3-642-41382-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642413834</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-41383-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-41383-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642413827</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86327191</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)864499300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041590109</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 462f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in information and computer security</subfield><subfield code="b">8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings</subfield><subfield code="c">Kazuo Sakiyama ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 318 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8231</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Okinawa</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sakiyama, Kazuo</subfield><subfield code="d">1971-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1043945539</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-41382-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8231</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8231</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-41383-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027035191</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Okinawa gnd-content |
genre_facet | Konferenzschrift 2013 Okinawa |
id | DE-604.BV041590109 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:30Z |
institution | BVB |
isbn | 364241382X 9783642413834 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027035191 |
oclc_num | 864499300 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 318 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XII, 318 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8231 Privatsphäre (DE-588)4123980-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Okinawa gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Privatsphäre (DE-588)4123980-5 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Sakiyama, Kazuo 1971- Sonstige (DE-588)1043945539 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-41382-7 Lecture notes in computer science 8231 (DE-604)BV014880109 8231 https://doi.org/10.1007/978-3-642-41383-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Lecture notes in computer science Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
title_auth | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
title_exact_search | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
title_full | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) |
title_fullStr | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) |
title_full_unstemmed | Advances in information and computer security 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings Kazuo Sakiyama ... (eds.) |
title_short | Advances in information and computer security |
title_sort | advances in information and computer security 8th international workshop on security iwsec 2013 okinawa japan november 18 20 2013 proceedings |
title_sub | 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18 - 20, 2013 ; proceedings |
topic | Privatsphäre (DE-588)4123980-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Privatsphäre Kryptoanalyse Kryptosystem Computersicherheit Kryptologie Sicherheitsprotokoll Konferenzschrift 2013 Okinawa |
url | https://doi.org/10.1007/978-3-642-41383-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027035191&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT sakiyamakazuo advancesininformationandcomputersecurity8thinternationalworkshoponsecurityiwsec2013okinawajapannovember18202013proceedings |