Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2015]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | Lecture Notes in Computer Science
9379 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | XI, 367 Seiten Illustrationen |
ISBN: | 9783319260969 9783319260952 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-319-26096-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043209559 | ||
003 | DE-604 | ||
005 | 20200511 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319260969 |c Online |9 978-3-319-26096-9 | ||
020 | |a 9783319260952 |c Print |9 978-3-319-26095-2 | ||
024 | 7 | |a 10.1007/978-3-319-26096-9 |2 doi | |
035 | |a (OCoLC)932569462 | ||
035 | |a (DE-599)BVBBV043209559 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Security Protocols XXIII |b 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers |c edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson |
250 | |a 1st ed. | ||
264 | 1 | |a Cham |b Springer International Publishing |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a XI, 367 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9379 |x 0302-9743 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Wahl |0 (DE-588)4432990-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 3 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Elektronische Wahl |0 (DE-588)4432990-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Christianson, Bruce |d 1958- |0 (DE-588)1064909507 |4 edt | |
711 | 2 | |a International Security Protocols Workshop |n 23. |d 2015 |c Cambridge |j Sonstige |0 (DE-588)1080063161 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9379 |w (DE-604)BV014880109 |9 9379 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-26096-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632720&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632720 |
Datensatz im Suchindex
_version_ | 1804175708707094528 |
---|---|
adam_text | SECURITY PROTOCOLS XXIII
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-WORKSHOP PROCEEDINGS
OF THE 23RD INTERNATIONAL WORKSHOP ON SECURITY PROTOCOLS, HELD IN
CAMBRIDGE, UK, IN MARCH/APRIL 2015.AFTER AN INTRODUCTION THE VOLUME
PRESENTS 18 REVISED PAPERS EACH FOLLOWED BY A REVISED TRANSCRIPT OF THE
PRESENTATION AND ENSUING DISCUSSION AT THE EVENT. THE THEME OF THIS
YEAR S WORKSHOP IS INFORMATION SECURITY IN FICTION AND IN FACT
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Christianson, Bruce 1958- |
author2_role | edt |
author2_variant | b c bc |
author_GND | (DE-588)1064909507 |
author_facet | Christianson, Bruce 1958- |
building | Verbundindex |
bvnumber | BV043209559 |
classification_tum | DAT 465f DAT 000 DAT 461f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)932569462 (DE-599)BVBBV043209559 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-26096-9 |
edition | 1st ed. |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03353nmm a2200757zcb4500</leader><controlfield tag="001">BV043209559</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200511 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319260969</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-26096-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319260952</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-26095-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-26096-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)932569462</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209559</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security Protocols XXIII</subfield><subfield code="b">23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers</subfield><subfield code="c">edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 367 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9379</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Wahl</subfield><subfield code="0">(DE-588)4432990-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Elektronische Wahl</subfield><subfield code="0">(DE-588)4432990-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Security Protocols Workshop</subfield><subfield code="n">23.</subfield><subfield code="d">2015</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1080063161</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9379</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9379</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-26096-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632720&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632720</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043209559 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:35Z |
institution | BVB |
institution_GND | (DE-588)1080063161 |
isbn | 9783319260969 9783319260952 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632720 |
oclc_num | 932569462 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-706 DE-20 DE-739 DE-92 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | XI, 367 Seiten Illustrationen |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson 1st ed. Cham Springer International Publishing [2015] © 2015 XI, 367 Seiten Illustrationen txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9379 0302-9743 Computer science Computer communication systems Computer security Data encryption (Computer science) Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Computer Communication Networks Informatik Privatsphäre (DE-588)4123980-5 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Elektronische Wahl (DE-588)4432990-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Sicherheitsprotokoll (DE-588)4709127-7 s Authentifikation (DE-588)4330656-1 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Kryptoanalyse (DE-588)4830502-9 s Elektronische Wahl (DE-588)4432990-8 s DE-604 Christianson, Bruce 1958- (DE-588)1064909507 edt International Security Protocols Workshop 23. 2015 Cambridge Sonstige (DE-588)1080063161 oth Lecture Notes in Computer Science 9379 (DE-604)BV014880109 9379 https://doi.org/10.1007/978-3-319-26096-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632720&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers Lecture Notes in Computer Science Computer science Computer communication systems Computer security Data encryption (Computer science) Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Computer Communication Networks Informatik Privatsphäre (DE-588)4123980-5 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Authentifikation (DE-588)4330656-1 gnd Trusted Computing (DE-588)7562931-8 gnd Elektronische Wahl (DE-588)4432990-8 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)4709127-7 (DE-588)4830502-9 (DE-588)4330656-1 (DE-588)7562931-8 (DE-588)4432990-8 (DE-588)1071861417 |
title | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers |
title_auth | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers |
title_exact_search | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers |
title_full | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson |
title_fullStr | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson |
title_full_unstemmed | Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson |
title_short | Security Protocols XXIII |
title_sort | security protocols xxiii 23rd international workshop cambridge uk march 31 april 2 2015 revised selected papers |
title_sub | 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, revised selected papers |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Computer Communication Networks Informatik Privatsphäre (DE-588)4123980-5 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Kryptoanalyse (DE-588)4830502-9 gnd Authentifikation (DE-588)4330656-1 gnd Trusted Computing (DE-588)7562931-8 gnd Elektronische Wahl (DE-588)4432990-8 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Management information systems Computer Science Systems and Data Security Data Encryption Management of Computing and Information Systems Computer Communication Networks Informatik Privatsphäre Sicherheitsprotokoll Kryptoanalyse Authentifikation Trusted Computing Elektronische Wahl Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-26096-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632720&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT christiansonbruce securityprotocolsxxiii23rdinternationalworkshopcambridgeukmarch31april22015revisedselectedpapers AT internationalsecurityprotocolsworkshopcambridge securityprotocolsxxiii23rdinternationalworkshopcambridgeukmarch31april22015revisedselectedpapers |