Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2015]
|
Schriftenreihe: | Lecture Notes in Computer Science
9092 |
Schlagworte: | |
Online-Zugang: | FLA01 UBR01 UBT01 Volltext Abstract Inhaltsverzeichnis |
Beschreibung: | 1 Online-Ressource (XVIII, 698 Seiten) 152 Illustrationen (farbig) |
ISBN: | 9783319281667 9783319281650 |
DOI: | 10.1007/978-3-319-28166-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043408649 | ||
003 | DE-604 | ||
005 | 20220614 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 160225s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319281667 |c Online |9 978-3-319-28166-7 | ||
020 | |a 9783319281650 |c Print |9 978-3-319-28165-0 | ||
024 | 7 | |a 10.1007/978-3-319-28166-7 |2 doi | |
035 | |a (OCoLC)936803518 | ||
035 | |a (DE-599)BVBBV043408649 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-859 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-861 |a DE-860 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Applied Cryptography and Network Security |b 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers |c Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) |
264 | 1 | |a [Cham] |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online-Ressource (XVIII, 698 Seiten) |b 152 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9092 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Informatik | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z New York, NY |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Malkin, Tal |d 1970- |0 (DE-588)17401354X |4 edt | |
700 | 1 | |a Kolesnikov, Vladimir |4 edt | |
700 | 1 | |a Bishop Lewko, Allison |4 edt | |
700 | 1 | |a Polychronakis, Michalis |4 edt | |
711 | 2 | |a ACNS |n 13. |d 2015 |c New York, NY |0 (DE-588)1084217848 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9092 |w (DE-604)BV014880109 |9 9092 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-28166-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028826996 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-28166-7 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28166-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-28166-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175996944908288 |
---|---|
adam_text | APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
/
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 13TH INTERNATIONAL
CONFERENCE ON APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2015, HELD
IN NEW YORK, NY, USA, IN JUNE 2015. THE 33 REVISED FULL PAPERS INCLUDED
IN THIS VOLUME AND PRESENTED TOGETHER WITH 2 ABSTRACTS OF INVITED TALKS,
WERE CAREFULLY REVIEWED AND SELECTED FROM 157 SUBMISSIONS. THEY ARE
ORGANIZED IN TOPICAL SECTIONS ON SECURE COMPUTATION: PRIMITIVES AND NEW
MODELS; PUBLIC KEY CRYPTOGRAPHIC PRIMITIVES; SECURE COMPUTATION II:
APPLICATIONS; ANONYMITY AND RELATED APPLICATIONS; CRYPTANALYSIS AND
ATTACKS (SYMMETRIC CRYPTO); PRIVACY AND POLICY ENFORCEMENT;
AUTHENTICATION VIA EYE TRACKING AND PROOFS OF PROXIMITY; MALWARE
ANALYSIS AND SIDE CHANNEL ATTACKS; SIDE CHANNEL COUNTERMEASURES AND
TAMPER RESISTANCE/PUFS; AND LEAKAGE RESILIENCE AND PSEUDORANDOMNESS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
/
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
SECURE COMPUTATION: PRIMITIVES AND NEW MODELS
PUBLIC KEY CRYPTOGRAPHIC PRIMITIVES
SECURE COMPUTATION II: APPLICATIONS
ANONYMITY AND RELATED APPLICATIONS
CRYPTANALYSIS AND ATTACKS (SYMMETRIC CRYPTO)
PRIVACY AND POLICY ENFORCEMENT
AUTHENTICATION VIA EYE TRACKING AND PROOFS OF PROXIMITY
MALWARE ANALYSIS AND SIDE CHANNEL ATTACKS
SIDE CHANNEL COUNTERMEASURES AND TAMPER RESISTANCE/PUFS
LEAKAGE RESILIENCE AND PSEUDORANDOMNESS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Malkin, Tal 1970- Kolesnikov, Vladimir Bishop Lewko, Allison Polychronakis, Michalis |
author2_role | edt edt edt edt |
author2_variant | t m tm v k vk l a b la lab m p mp |
author_GND | (DE-588)17401354X |
author_facet | Malkin, Tal 1970- Kolesnikov, Vladimir Bishop Lewko, Allison Polychronakis, Michalis |
building | Verbundindex |
bvnumber | BV043408649 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)936803518 (DE-599)BVBBV043408649 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-28166-7 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04137nmm a2200889zcb4500</leader><controlfield tag="001">BV043408649</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220614 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160225s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319281667</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-28166-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319281650</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-28165-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-28166-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)936803518</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043408649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied Cryptography and Network Security</subfield><subfield code="b">13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers</subfield><subfield code="c">Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVIII, 698 Seiten)</subfield><subfield code="b">152 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9092</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">New York, NY</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Malkin, Tal</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)17401354X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kolesnikov, Vladimir</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bishop Lewko, Allison</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Polychronakis, Michalis</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACNS</subfield><subfield code="n">13.</subfield><subfield code="d">2015</subfield><subfield code="c">New York, NY</subfield><subfield code="0">(DE-588)1084217848</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9092</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9092</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-28166-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028826996</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28166-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28166-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-28166-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 New York, NY gnd-content |
genre_facet | Konferenzschrift 2015 New York, NY |
id | DE-604.BV043408649 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:25:10Z |
institution | BVB |
institution_GND | (DE-588)1084217848 |
isbn | 9783319281667 9783319281650 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028826996 |
oclc_num | 936803518 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
owner_facet | DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-859 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-861 DE-860 |
physical | 1 Online-Ressource (XVIII, 698 Seiten) 152 Illustrationen (farbig) |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) [Cham] Springer [2015] © 2015 1 Online-Ressource (XVIII, 698 Seiten) 152 Illustrationen (farbig) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9092 Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society Informatik Kryptologie (DE-588)4033329-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 New York, NY gnd-content Kryptologie (DE-588)4033329-2 s Kryptosystem (DE-588)4209132-9 s DE-604 Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Kryptoanalyse (DE-588)4830502-9 s Malkin, Tal 1970- (DE-588)17401354X edt Kolesnikov, Vladimir edt Bishop Lewko, Allison edt Polychronakis, Michalis edt ACNS 13. 2015 New York, NY (DE-588)1084217848 oth Lecture Notes in Computer Science 9092 (DE-604)BV014880109 9092 https://doi.org/10.1007/978-3-319-28166-7 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers Lecture Notes in Computer Science Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society Informatik Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4011144-1 (DE-588)4070085-9 (DE-588)4209132-9 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)1071861417 |
title | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers |
title_auth | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers |
title_exact_search | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers |
title_full | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) |
title_fullStr | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) |
title_full_unstemmed | Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) |
title_short | Applied Cryptography and Network Security |
title_sort | applied cryptography and network security 13th international conference acns 2015 new york ny usa june 2 5 2015 revised selected papers |
title_sub | 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : Revised Selected Papers |
topic | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society Informatik Kryptologie (DE-588)4033329-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Computer communication systems Computer security Data encryption (Computer science) Computers Computers and civilization Management information systems Computer Science Systems and Data Security Data Encryption Computer Communication Networks Management of Computing and Information Systems Theory of Computation Computers and Society Informatik Kryptologie Datensicherung Rechnernetz Kryptosystem Kryptoanalyse Computersicherheit Konferenzschrift 2015 New York, NY |
url | https://doi.org/10.1007/978-3-319-28166-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028826996&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT malkintal appliedcryptographyandnetworksecurity13thinternationalconferenceacns2015newyorknyusajune252015revisedselectedpapers AT kolesnikovvladimir appliedcryptographyandnetworksecurity13thinternationalconferenceacns2015newyorknyusajune252015revisedselectedpapers AT bishoplewkoallison appliedcryptographyandnetworksecurity13thinternationalconferenceacns2015newyorknyusajune252015revisedselectedpapers AT polychronakismichalis appliedcryptographyandnetworksecurity13thinternationalconferenceacns2015newyorknyusajune252015revisedselectedpapers AT acnsnewyorkny appliedcryptographyandnetworksecurity13thinternationalconferenceacns2015newyorknyusajune252015revisedselectedpapers |