Information Security and Privacy: 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9144 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 510 p. 102 illus) |
ISBN: | 9783319199627 9783319199610 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-19962-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042669555 | ||
003 | DE-604 | ||
005 | 20150708 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 150703s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319199627 |c Online |9 978-3-319-19962-7 | ||
020 | |a 9783319199610 |c Print |9 978-3-319-19961-0 | ||
024 | 7 | |a 10.1007/978-3-319-19962-7 |2 doi | |
035 | |a (OCoLC)913021470 | ||
035 | |a (DE-599)BVBBV042669555 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information Security and Privacy |b 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings |c edited by Ernest Foo, Douglas Stebila |
264 | 1 | |a Cham |b Springer |c 2015 | |
300 | |a 1 Online-Ressource (XI, 510 p. 102 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9144 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer software | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymisierung |0 (DE-588)4139362-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Brisbane |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Private-Key-Kryptosystem |0 (DE-588)4317451-6 |D s |
689 | 0 | 2 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | 3 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 0 | 4 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 5 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 6 | |a Anonymisierung |0 (DE-588)4139362-4 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Foo, Ernest |e Sonstige |0 (DE-588)1072505983 |4 oth | |
711 | 2 | |a ACISP |n 20. |d 2015 |c Brisbane |j Sonstige |0 (DE-588)1072487039 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9144 |w (DE-604)BV014880109 |9 9144 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-19962-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028101638 |
Datensatz im Suchindex
_version_ | 1804174859134042112 |
---|---|
adam_text | INFORMATION SECURITY AND PRIVACY
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SYMMETRIC CRYPTANALYSIS
PUBLIC KEY CRYPTOGRAPHY
IDENTITY-BASED ENCRYPTION
DIGITAL SIGNATURES
SECURITY PROTOCOLS
PRIVACY PROTOCOLS
SYMMETRIC CONSTRUCTIONS
HOMOMORPHIC ENCRYPTION AND OBFUSCATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
INFORMATION SECURITY AND PRIVACY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED CONFERENCE PROCEEDINGS OF THE 20TH
AUSTRALASIAN CONFERENCE ON INFORMATION SECURITY AND PRIVACY, ACISP 2015,
HELD IN BRISBANE, QLD, AUSTRALIA, IN JUNE/JULY 2015. THE 28 REVISED FULL
PAPERS PRESENTED IN THIS VOLUME WERE CAREFULLY REVISED AND SELECTED FROM
112 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON
SYMMETRIC CRYPTANALYSIS; PUBLIC KEY CRYPTOGRAPHY; IDENTITY-BASED
ENCRYPTION; DIGITAL SIGNATURES; SECURITY PROTOCOLS; PRIVACY PROTOCOLS;
SYMMETRIC CONSTRUCTIONS; HOMOMORPHIC ENCRYPTION AND OBFUSCATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)1072505983 |
building | Verbundindex |
bvnumber | BV042669555 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)913021470 (DE-599)BVBBV042669555 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-19962-7 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03572nmm a2200757zcb4500</leader><controlfield tag="001">BV042669555</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150708 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150703s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319199627</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-19962-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319199610</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-19961-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-19962-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)913021470</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042669555</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security and Privacy</subfield><subfield code="b">20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings</subfield><subfield code="c">edited by Ernest Foo, Douglas Stebila</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 510 p. 102 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9144</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Brisbane</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Private-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4317451-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foo, Ernest</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1072505983</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACISP</subfield><subfield code="n">20.</subfield><subfield code="d">2015</subfield><subfield code="c">Brisbane</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1072487039</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9144</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9144</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-19962-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028101638</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Brisbane gnd-content |
genre_facet | Konferenzschrift 2015 Brisbane |
id | DE-604.BV042669555 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:07:05Z |
institution | BVB |
institution_GND | (DE-588)1072487039 |
isbn | 9783319199627 9783319199610 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028101638 |
oclc_num | 913021470 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 510 p. 102 illus) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings edited by Ernest Foo, Douglas Stebila Cham Springer 2015 1 Online-Ressource (XI, 510 p. 102 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9144 0302-9743 Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Informatik Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Private-Key-Kryptosystem (DE-588)4317451-6 gnd rswk-swf Anonymisierung (DE-588)4139362-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Brisbane gnd-content Kryptoanalyse (DE-588)4830502-9 s Private-Key-Kryptosystem (DE-588)4317451-6 s Public-Key-Kryptosystem (DE-588)4209133-0 s Hash-Algorithmus (DE-588)4323071-4 s Sicherheitsprotokoll (DE-588)4709127-7 s Computersicherheit (DE-588)4274324-2 s Anonymisierung (DE-588)4139362-4 s DE-604 Foo, Ernest Sonstige (DE-588)1072505983 oth ACISP 20. 2015 Brisbane Sonstige (DE-588)1072487039 oth Lecture Notes in Computer Science 9144 (DE-604)BV014880109 9144 https://doi.org/10.1007/978-3-319-19962-7 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings Lecture Notes in Computer Science Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Informatik Public-Key-Kryptosystem (DE-588)4209133-0 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Private-Key-Kryptosystem (DE-588)4317451-6 gnd Anonymisierung (DE-588)4139362-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4209133-0 (DE-588)4323071-4 (DE-588)4830502-9 (DE-588)4709127-7 (DE-588)4317451-6 (DE-588)4139362-4 (DE-588)4274324-2 (DE-588)1071861417 |
title | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings |
title_auth | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings |
title_exact_search | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings |
title_full | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings edited by Ernest Foo, Douglas Stebila |
title_fullStr | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings edited by Ernest Foo, Douglas Stebila |
title_full_unstemmed | Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings edited by Ernest Foo, Douglas Stebila |
title_short | Information Security and Privacy |
title_sort | information security and privacy 20th australasian conference acisp 2015 brisbane qld australia june 29 july 1 2015 proceedings |
title_sub | 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings |
topic | Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Informatik Public-Key-Kryptosystem (DE-588)4209133-0 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Private-Key-Kryptosystem (DE-588)4317451-6 gnd Anonymisierung (DE-588)4139362-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Data protection Data encryption (Computer science) Computer software Information Systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Informatik Public-Key-Kryptosystem Hash-Algorithmus Kryptoanalyse Sicherheitsprotokoll Private-Key-Kryptosystem Anonymisierung Computersicherheit Konferenzschrift 2015 Brisbane |
url | https://doi.org/10.1007/978-3-319-19962-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028101638&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT fooernest informationsecurityandprivacy20thaustralasianconferenceacisp2015brisbaneqldaustraliajune29july12015proceedings AT acispbrisbane informationsecurityandprivacy20thaustralasianconferenceacisp2015brisbaneqldaustraliajune29july12015proceedings |