Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
8957 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XIII, 547 p.) Ill. |
ISBN: | 9783319167459 9783319167442 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-16745-9 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV042481949 | ||
003 | DE-604 | ||
005 | 20150715 | ||
007 | cr|uuu---uuuuu | ||
008 | 150402s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783319167459 |c Online |9 978-3-319-16745-9 | ||
020 | |a 9783319167442 |c Print |9 978-3-319-16744-2 | ||
024 | 7 | |a 10.1007/978-3-319-16745-9 |2 doi | |
035 | |a (OCoLC)906210670 | ||
035 | |a (DE-599)BVBBV042481949 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-29 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information Security and Cryptology |b 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers |c edited by Dongdai Lin, Moti Yung, Jianying Zhou |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XIII, 547 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 8957 |x 0302-9743 | |
650 | 0 | 7 | |a Codierung |0 (DE-588)4070059-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Codierung |0 (DE-588)4070059-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
689 | 3 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 3 | |8 3\p |5 DE-604 | |
700 | 1 | |a Dongdai, Lin |d 1964- |e Sonstige |4 oth | |
711 | 2 | |a Inscrypt |n 10. |d 2014 |c Peking |j Sonstige |0 (DE-588)1069699934 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 8957 |w (DE-604)BV014880109 |9 8957 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-16745-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027916908 |
Datensatz im Suchindex
_version_ | 1820875658831593472 |
---|---|
adam_text |
INFORMATION SECURITY AND CRYPTOLOGY
/ LIN, DONGDAI
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY
AND CRYPTOLOGY, INSCRYPT 2014, HELD IN BEIJING, CHINA, IN DECEMBER 2014.
THE 29 REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND
SELECTED FROM 93 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL
SECTIONS ON PRIVACY AND ANONYMITY, MULTIPARTY AND OUTSOURCE COMPUTATION,
SIGNATURE AND SECURITY PROTOCOLS, LATTICE AND PUBLIC KEY CRYPTOGRAPHY,
BLOCK CIPHER AND HASH FUNCTION, AUTHENTICATION AND ENCRYPTION, ELLIPTIC
CURVE, AND CRYPTOGRAPHIC PRIMITIVE AND APPLICATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION SECURITY AND CRYPTOLOGY
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
AN EFFICIENT PRIVACY-PRESERVING E-COUPON SYSTEM
SPATIAL BLOOM FILTERS: ENABLING PRIVACY IN LOCATION-AWARE APPLICATIONS
SECURITY OF DIRECT ANONYMOUS AUTHENTICATION USING TPM 2.0 SIGNATURE
REVOCATION IN PUBLICLY VERIFIABLE OUTSOURCED COMPUTATION
PRIVATE AGGREGATION WITH CUSTOM COLLUSION TOLERANCE
RING SIGNATURES OF CONSTANT SIZE WITHOUT RANDOM ORACLES
UNIVERSALLY COMPOSABLE IDENTITY BASED ADAPTIVE OBLIVIOUS TRANSFER WITH
ACCESS CONTROL
THREE-ROUND PUBLIC-COIN BOUNDED-AUXILIARY-INPUT ZERO-KNOWLEDGE ARGUMENTS
OF KNOWLEDGE
A MODEL-DRIVEN SECURITY REQUIREMENTS APPROACH TO DEDUCE SECURITY
POLICIES BASED ON ORBAC
OPTIMAL PROXIMITY PROOFS
SIMPLER CCA-SECURE PUBLIC KEY ENCRYPTION FROM LOSSY TRAPDOOR FUNCTIONS
ATTACKING RSA WITH A COMPOSED DECRYPTION EXPONENT USING UNRAVELLED
LINEARIZATION
FULLY HOMOMORPHIC ENCRYPTION WITH AUXILIARY INPUTS
TRAPDOORS FOR IDEAL LATTICES WITH APPLICATIONS
SPEEDING UP THE SEARCH ALGORITHM FOR THE BEST DIFFERENTIAL AND BEST
LINEAR TRAILS
THE BOOMERANG ATTACKS ON BLAKE AND BLAKE2
SECOND PREIMAGE ANALYSIS OF WHIRLWIND
BOOMERANG ATTACK ON STEP-REDUCED SHA-512
COLLISION ATTACK ON 4-BRANCH, TYPE-2 GFN BASED HASH FUNCTIONS USING
SLICED BICLIQUE CRYPTANALYSIS TECHNIQUE
RIG: A SIMPLE, SECURE AND FLEXIBLE DESIGN FOR PASSWORD HASHING
EFFICIENT HARDWARE ACCELERATOR FOR AEGIS-128 AUTHENTICATED ENCRYPTION
FULLY COLLUSION-RESISTANT TRACEABLE KEY-POLICY ATTRIBUTE-BASED
ENCRYPTION WITH SUB-LINEAR SIZE CIPHERTEXTS
INTEGRATING CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION WITH
IDENTITY-BASED RING SIGNATURE TO ENHANCE SECURITY AND PRIVACY IN
WIRELESS BODY AREA NETWORKS
PARALLELIZED SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE SCALAR
MULTIPLICATION
A NOTE ON DIEM’S PROOF
STAND-BY ATTACKS ON E-ID PASSWORD AUTHENTICATION
STEGOMALWARE: PLAYING HIDE AND SEEK WITH MALICIOUS COMPONENTS IN
SMARTPHONE APPS
A LIGHTWEIGHT SECURITY ISOLATION APPROACH FOR VIRTUAL MACHINES
DEPLOYMENT
A NOVEL APPROACH TO TRUE RANDOM NUMBER GENERATION IN WEARABLE COMPUTING
ENVIRONMENTS USING MEMS SENSORS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV042481949 |
classification_rvk | ST 276 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)906210670 (DE-599)BVBBV042481949 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-16745-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV042481949</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150715</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150402s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319167459</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-16745-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319167442</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-16744-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-16745-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)906210670</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042481949</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security and Cryptology</subfield><subfield code="b">10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers</subfield><subfield code="c">edited by Dongdai Lin, Moti Yung, Jianying Zhou</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 547 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8957</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Codierung</subfield><subfield code="0">(DE-588)4070059-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dongdai, Lin</subfield><subfield code="d">1964-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Inscrypt</subfield><subfield code="n">10.</subfield><subfield code="d">2014</subfield><subfield code="c">Peking</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1069699934</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">8957</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8957</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-16745-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027916908</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042481949 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:19:07Z |
institution | BVB |
institution_GND | (DE-588)1069699934 |
isbn | 9783319167459 9783319167442 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027916908 |
oclc_num | 906210670 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XIII, 547 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers edited by Dongdai Lin, Moti Yung, Jianying Zhou Cham Springer International Publishing 2015 1 Online-Ressource (XIII, 547 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 8957 0302-9743 Codierung (DE-588)4070059-8 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Chiffrierung (DE-588)4352893-4 s Codierung (DE-588)4070059-8 s DE-604 Kryptoanalyse (DE-588)4830502-9 s 1\p DE-604 Kryptologie (DE-588)4033329-2 s 2\p DE-604 Kryptosystem (DE-588)4209132-9 s 3\p DE-604 Dongdai, Lin 1964- Sonstige oth Inscrypt 10. 2014 Peking Sonstige (DE-588)1069699934 oth Lecture Notes in Computer Science 8957 (DE-604)BV014880109 8957 https://doi.org/10.1007/978-3-319-16745-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers Lecture Notes in Computer Science Codierung (DE-588)4070059-8 gnd Datenschutz (DE-588)4011134-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Informatik (DE-588)4026894-9 gnd Kryptologie (DE-588)4033329-2 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4070059-8 (DE-588)4011134-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4026894-9 (DE-588)4033329-2 (DE-588)4352893-4 (DE-588)1071861417 |
title | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers |
title_auth | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers |
title_exact_search | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers |
title_full | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers edited by Dongdai Lin, Moti Yung, Jianying Zhou |
title_fullStr | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers edited by Dongdai Lin, Moti Yung, Jianying Zhou |
title_full_unstemmed | Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers edited by Dongdai Lin, Moti Yung, Jianying Zhou |
title_short | Information Security and Cryptology |
title_sort | information security and cryptology 10th international conference inscrypt 2014 beijing china december 13 15 2014 revised selected papers |
title_sub | 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers |
topic | Codierung (DE-588)4070059-8 gnd Datenschutz (DE-588)4011134-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Informatik (DE-588)4026894-9 gnd Kryptologie (DE-588)4033329-2 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Codierung Datenschutz Kryptosystem Kryptoanalyse Informatik Kryptologie Chiffrierung Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-16745-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027916908&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT dongdailin informationsecurityandcryptology10thinternationalconferenceinscrypt2014beijingchinadecember13152014revisedselectedpapers AT inscryptpeking informationsecurityandcryptology10thinternationalconferenceinscrypt2014beijingchinadecember13152014revisedselectedpapers |