Leakage Resilient Password Systems:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 64 p.) Ill. |
ISBN: | 9783319175034 |
ISSN: | 2191-5768 |
DOI: | 10.1007/978-3-319-17503-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042544556 | ||
003 | DE-604 | ||
005 | 20150519 | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319175034 |c Online |9 978-3-319-17503-4 | ||
024 | 7 | |a 10.1007/978-3-319-17503-4 |2 doi | |
035 | |a (OCoLC)908701571 | ||
035 | |a (DE-599)BVBBV042544556 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Li, Yingjiu |e Verfasser |0 (DE-588)136886922 |4 aut | |
245 | 1 | 0 | |a Leakage Resilient Password Systems |c by Yingjiu Li, Qiang Yan, Robert H. Deng |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (X, 64 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science |x 2191-5768 | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Passwort |0 (DE-588)4570553-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 2 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 3 | |a Passwort |0 (DE-588)4570553-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Yan, Qiang |e Sonstige |4 oth | |
700 | 1 | |a Deng, Robert |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-17502-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-17503-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978562 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-17503-4 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153310253416448 |
---|---|
adam_text | LEAKAGE RESILIENT PASSWORD SYSTEMS
/ LI, YINGJIU
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
LEAKAGE RESILIENT PASSWORD SYSTEMS: ATTACKS, PRINCIPLES AND USABILITY
COVER PAD: A LEAKAGE RESILIENT PASSWORD SYSTEM ON TOUCH-SCREEN MOBILE
DEVICES
SHADOW KEY: A PRACTICAL LEAKAGE RESILIENT PASSWORD SYSTEM
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
LEAKAGE RESILIENT PASSWORD SYSTEMS
/ LI, YINGJIU
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK INVESTIGATES TRADEOFF BETWEEN SECURITY AND USABILITY IN
DESIGNING LEAKAGE RESILIENT PASSWORD SYSTEMS (LRP) AND INTRODUCES TWO
PRACTICAL LRP SYSTEMS NAMED COVER PAD AND SHADOWKEY. IT DEMONSTRATES
THAT EXISTING LRP SYSTEMS ARE SUBJECT TO BOTH BRUTE FORCE ATTACKS AND
STATISTICAL ATTACKS AND THAT THESE ATTACKS CANNOT BE EFFECTIVELY
MITIGATED WITHOUT SACRIFICING THE USABILITY OF LRP SYSTEMS. QUANTITATIVE
ANALYSIS PROVES THAT A SECURE LRP SYSTEM IN PRACTICAL SETTINGS IMPOSES A
CONSIDERABLE AMOUNT OF COGNITIVE WORKLOAD UNLESS CERTAIN SECURE CHANNELS
ARE INVOLVED. THE BOOK INTRODUCES A SECURE AND PRACTICAL LRP SYSTEM,
NAMED COVER PAD, FOR PASSWORD ENTRY ON TOUCH-SCREEN MOBILE DEVICES.
COVER PAD LEVERAGES A TEMPORARY SECURE CHANNEL BETWEEN A USER AND A
TOUCH SCREEN WHICH CAN BE EASILY REALIZED BY PLACING A HAND SHIELDING
GESTURE ON THE TOUCH SCREEN. THE TEMPORARY SECURE CHANNEL IS USED TO
DELIVER A HIDDEN MESSAGE TO THE USER FOR TRANSFORMING EACH PASSWORD
SYMBOL BEFORE ENTERING IT ON THE TOUCH SCREEN. A USER STUDY SHOWS THE
IMPACT OF THESE TESTING CONDITIONS ON THE USERS PERFORMANCE IN
PRACTICE. FINALLY, THIS BOOK INTRODUCES A NEW LRP SYSTEM NAMED
SHADOWKEY. SHADOW KEY IS DESIGNED TO ACHIEVE BETTER USABILITY FOR
LEAKAGE RESILIENT PASSWORD ENTRY. IT LEVERAGES EITHER A PERMANENT SECURE
CHANNEL, WHICH NATURALLY EXISTS BETWEEN A USER AND THE DISPLAY UNIT OF
CERTAIN MOBILE DEVICES, OR A TEMPORARY SECURE CHANNEL, WHICH CAN BE
EASILY REALIZED BETWEEN A USER AND A TOUCH SCREEN WITH A HAND-SHIELDING
GESTURE. THE SECURE CHANNEL PROTECTS THE MAPPINGS BETWEEN ORIGINAL
PASSWORD SYMBOLS AND ASSOCIATED RANDOM SYMBOLS. UNLIKE PREVIOUS LRP
SYSTEM USERS, SHADOW KEY USERS DO NOT NEED TO REMEMBER ANYTHING EXCEPT
THEIR PASSWORDS. LEAKAGE RESILIENT PASSWORD SYSTEMS IS DESIGNED FOR
PROFESSIONALS WORKING IN THE SECURITY INDUSTRY. ADVANCED-LEVEL STUDENTS
STUDYING COMPUTER SCIENCE AND ELECTRICAL ENGINEERING WILL FIND THIS
BRIEF FULL OF USEFUL MATERIAL
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Li, Yingjiu |
author_GND | (DE-588)136886922 |
author_facet | Li, Yingjiu |
author_role | aut |
author_sort | Li, Yingjiu |
author_variant | y l yl |
building | Verbundindex |
bvnumber | BV042544556 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)908701571 (DE-599)BVBBV042544556 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-17503-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03797nmm a2200697zc 4500</leader><controlfield tag="001">BV042544556</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150519 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319175034</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-17503-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-17503-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701571</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544556</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Li, Yingjiu</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136886922</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Leakage Resilient Password Systems</subfield><subfield code="c">by Yingjiu Li, Qiang Yan, Robert H. Deng</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 64 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Passwort</subfield><subfield code="0">(DE-588)4570553-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Passwort</subfield><subfield code="0">(DE-588)4570553-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yan, Qiang</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Deng, Robert</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-17502-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978562</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-17503-4</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042544556 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
isbn | 9783319175034 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978562 |
oclc_num | 908701571 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (X, 64 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spelling | Li, Yingjiu Verfasser (DE-588)136886922 aut Leakage Resilient Password Systems by Yingjiu Li, Qiang Yan, Robert H. Deng Cham Springer International Publishing 2015 1 Online-Ressource (X, 64 p.) Ill. txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Computer Science 2191-5768 Datenschutz (DE-588)4011134-9 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Informatik (DE-588)4026894-9 gnd rswk-swf Passwort (DE-588)4570553-7 gnd rswk-swf Datenschutz (DE-588)4011134-9 s Informatik (DE-588)4026894-9 s Chiffrierung (DE-588)4352893-4 s Passwort (DE-588)4570553-7 s DE-604 Yan, Qiang Sonstige oth Deng, Robert Sonstige oth Erscheint auch als Druckausgabe 978-3-319-17502-7 https://doi.org/10.1007/978-3-319-17503-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Li, Yingjiu Leakage Resilient Password Systems Datenschutz (DE-588)4011134-9 gnd Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Passwort (DE-588)4570553-7 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4352893-4 (DE-588)4026894-9 (DE-588)4570553-7 |
title | Leakage Resilient Password Systems |
title_auth | Leakage Resilient Password Systems |
title_exact_search | Leakage Resilient Password Systems |
title_full | Leakage Resilient Password Systems by Yingjiu Li, Qiang Yan, Robert H. Deng |
title_fullStr | Leakage Resilient Password Systems by Yingjiu Li, Qiang Yan, Robert H. Deng |
title_full_unstemmed | Leakage Resilient Password Systems by Yingjiu Li, Qiang Yan, Robert H. Deng |
title_short | Leakage Resilient Password Systems |
title_sort | leakage resilient password systems |
topic | Datenschutz (DE-588)4011134-9 gnd Chiffrierung (DE-588)4352893-4 gnd Informatik (DE-588)4026894-9 gnd Passwort (DE-588)4570553-7 gnd |
topic_facet | Datenschutz Chiffrierung Informatik Passwort |
url | https://doi.org/10.1007/978-3-319-17503-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978562&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT liyingjiu leakageresilientpasswordsystems AT yanqiang leakageresilientpasswordsystems AT dengrobert leakageresilientpasswordsystems |