Foundations of security analysis and design VII: FOSAD 2012/2013 tutorial lectures
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
[2014]
|
Schriftenreihe: | Lecture notes in computer science
8604 : Security and cryptology |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 TUM01 UBA01 UBG01 UBM01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource Illustrationen, Diagramme |
ISBN: | 9783319100821 |
DOI: | 10.1007/978-3-319-10082-1 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV042038399 | ||
003 | DE-604 | ||
005 | 20240229 | ||
007 | cr|uuu---uuuuu | ||
008 | 140822s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319100821 |c online |9 978-3-319-10082-1 | ||
024 | 7 | |a 10.1007/978-3-319-10082-1 |2 doi | |
035 | |a (OCoLC)890023889 | ||
035 | |a (DE-599)BVBBV042038399 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-19 |a DE-29 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-634 | ||
082 | 0 | |a 004 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465 |2 stub | ||
084 | |a DAT 050 |2 stub | ||
245 | 1 | 0 | |a Foundations of security analysis and design VII |b FOSAD 2012/2013 tutorial lectures |c Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c [2014] | |
300 | |a 1 Online-Ressource |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8604 |a Security and cryptology | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Aldini, Alessandro |0 (DE-588)1228377820 |4 edt | |
700 | 1 | |a Lopez, Javier |4 edt | |
700 | 1 | |a Martinelli, Fabio |d 1969- |0 (DE-588)121504691X |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-10081-4 |
830 | 0 | |a Lecture notes in computer science |v 8604 : Security and cryptology |w (DE-604)BV014880109 |9 8604 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-10082-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-LNC_201 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027479699 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2014 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UBA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152463599599616 |
---|---|
adam_text | FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
MODEL-BASED TESTING FOR FUNCTIONAL AND SECURITY TEST GENERATION
MODEL-BASED SECURITY ENGINEERING: MANAGED CO-EVOLUTION OF SECURITY
KNOWLEDGE AND SOFTWARE MODELS.-AUTOMATIC VERIFICATION OF SECURITY
PROTOCOLS IN THE SYMBOLIC MODEL: THE VERIFIER PROVERIF.-DEFENSIVE
JAVASCRIPT: BUILDING AND VERIFYING SECURE WEB COMPONENTS.-INFORMATION
FLOW CONTROL FOR WEB SCRIPTS
EASYCRYPT: A TUTORIAL.-CRYPTOGRAPHIC VOTING — A GENTLE
INTRODUCTION.-ENCRYPTION AND FRAGMENTATION FOR DATA CONFIDENTIALITY IN
THE CLOUD.-LOCATION PRIVACY IN WSNS: SOLUTIONS, CHALLENGES, AND FUTURE
TRENDS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII
/
: 2014
ABSTRACT / INHALTSTEXT
FOSAD HAS BEEN ONE OF THE FOREMOST EDUCATIONAL EVENTS ESTABLISHED WITH
THE GOAL OF DISSEMINATING KNOWLEDGE IN THE CRITICAL AREA OF SECURITY IN
COMPUTER SYSTEMS AND NETWORKS. OVER THE YEARS, BOTH THE SUMMER SCHOOL
AND THE BOOK SERIES HAVE REPRESENTED A REFERENCE POINT FOR GRADUATE
STUDENTS AND YOUNG RESEARCHERS FROM ACADEMIA OR INDUSTRY, INTERESTED TO
APPROACH THE FIELD, INVESTIGATE OPEN PROBLEMS, AND FOLLOW PRIORITY LINES
OF RESEARCH. THIS BOOK PRESENTS THOROUGHLY REVISED VERSIONS OF NINE
TUTORIAL LECTURES GIVEN BY LEADING RESEARCHERS DURING THREE
INTERNATIONAL SCHOOLS ON FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN,
FOSAD, HELD IN BERTINORO, ITALY, IN SEPTEMBER 2012 AND 2013. THE TOPICS
COVERED IN THIS BOOK INCLUDE MODEL-BASED SECURITY, AUTOMATIC
VERIFICATION OF SECURE APPLICATIONS, INFORMATION FLOW ANALYSIS,
CRYPTOGRAPHIC VOTING SYSTEMS, ENCRYPTION IN THE CLOUD, AND PRIVACY
PRESERVATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Aldini, Alessandro Lopez, Javier Martinelli, Fabio 1969- |
author2_role | edt edt edt |
author2_variant | a a aa j l jl f m fm |
author_GND | (DE-588)1228377820 (DE-588)121504691X |
author_facet | Aldini, Alessandro Lopez, Javier Martinelli, Fabio 1969- |
building | Verbundindex |
bvnumber | BV042038399 |
classification_rvk | SS 4800 |
classification_tum | DAT 465 DAT 050 |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)890023889 (DE-599)BVBBV042038399 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-10082-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04010nmm a2200721 cb4500</leader><controlfield tag="001">BV042038399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240229 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140822s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319100821</subfield><subfield code="c">online</subfield><subfield code="9">978-3-319-10082-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-10082-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890023889</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042038399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of security analysis and design VII</subfield><subfield code="b">FOSAD 2012/2013 tutorial lectures</subfield><subfield code="c">Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8604</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aldini, Alessandro</subfield><subfield code="0">(DE-588)1228377820</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Javier</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martinelli, Fabio</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)121504691X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-10081-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8604 : Security and cryptology</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_201</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027479699</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2014</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV042038399 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:11:07Z |
institution | BVB |
isbn | 9783319100821 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027479699 |
oclc_num | 890023889 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-19 DE-BY-UBM DE-29 DE-92 DE-Aug4 DE-859 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-19 DE-BY-UBM DE-29 DE-92 DE-Aug4 DE-859 DE-634 |
physical | 1 Online-Ressource Illustrationen, Diagramme |
psigel | ZDB-2-LNC ZDB-2-LNC_201 ZDB-2-LNC ZDB-2-LNC_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science Security and cryptology |
spelling | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) Cham [u.a.] Springer [2014] 1 Online-Ressource Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8604 Security and cryptology Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s DE-604 Aldini, Alessandro (DE-588)1228377820 edt Lopez, Javier edt Martinelli, Fabio 1969- (DE-588)121504691X edt Erscheint auch als Druckausgabe 978-3-319-10081-4 Lecture notes in computer science 8604 : Security and cryptology (DE-604)BV014880109 8604 https://doi.org/10.1007/978-3-319-10082-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Lecture notes in computer science Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4209132-9 (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4143413-4 |
title | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures |
title_auth | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures |
title_exact_search | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures |
title_full | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
title_fullStr | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
title_full_unstemmed | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
title_short | Foundations of security analysis and design VII |
title_sort | foundations of security analysis and design vii fosad 2012 2013 tutorial lectures |
title_sub | FOSAD 2012/2013 tutorial lectures |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computersicherheit Kryptosystem Datensicherung Kryptologie Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-319-10082-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT aldinialessandro foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures AT lopezjavier foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures AT martinellifabio foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures |