Eintrag weiter verarbeiten

Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings

Gespeichert in:

Personen und Körperschaften: Steinfeld, Ron (VerfasserIn), Hawkes, Philip (Sonstige)
Titel: Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings/ edited by Ron Steinfeld, Philip Hawkes
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6168
Schlagwörter:
Buchausg. u.d.T.: Information security and privacy, Berlin : Springer, 2010, XII, 402 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 07874cam a22015852 4500
001 0-1650224346
003 DE-627
005 20240122105245.0
007 cr uuu---uuuuu
008 101005s2010 gw |||||o 00| ||eng c
020 |a 9783642140815  |9 978-3-642-14081-5 
024 7 |a 10.1007/978-3-642-14081-5  |2 doi 
035 |a (DE-627)1650224346 
035 |a (DE-576)330929720 
035 |a (DE-599)BSZ330929720 
035 |a (OCoLC)682059366 
035 |a (ZBM)1198.94015 
035 |a (DE-He213)978-3-642-14081-5 
035 |a (EBP)040529231 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UTN  |2 bicssc 
072 7 |a UR  |2 bicssc 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 94A62  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.38  |2 bkl 
100 1 |a Steinfeld, Ron  |4 aut 
245 1 0 |a Information Security and Privacy  |b 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings  |c edited by Ron Steinfeld, Philip Hawkes 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (XII, 403p. 40 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6168 
490 0 |a SpringerLink  |a Bücher 
520 |a Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Computational complexity 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer networks . 
650 0 |a Electronic data processing 
650 0 |a Algorithms. 
650 0 |a Cryptography. 
650 0 |a Discrete mathematics. 
655 7 |a Konferenzschrift  |y 2010  |z Sydney  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 1 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 2 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 1 1 |D s  |0 (DE-588)4209132-9  |0 (DE-627)105106836  |0 (DE-576)210190086  |a Kryptosystem  |2 gnd 
689 1 2 |D s  |0 (DE-588)4323071-4  |0 (DE-627)128104287  |0 (DE-576)211241636  |a Hash-Algorithmus  |2 gnd 
689 1 3 |D s  |0 (DE-588)4709127-7  |0 (DE-627)357053206  |0 (DE-576)215560337  |a Sicherheitsprotokoll  |2 gnd 
689 1 |5 DE-101 
700 1 |a Hawkes, Philip  |4 oth 
776 1 |z 9783642140808 
776 0 8 |i Buchausg. u.d.T.  |t Information security and privacy  |d Berlin : Springer, 2010  |h XII, 402 S.  |w (DE-627)627267920  |w (DE-576)325089183  |z 3642140807  |z 9783642140808 
830 0 |a Lecture notes in computer science  |v 6168  |9 6168  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-14081-5  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz330929720cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20150922163618  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1198.94015  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Kryptographisches System 
950 |a Verschlüsselungssystem 
950 |a Chiffriersystem 
950 |a Chiffrierung 
950 |a Geheimschlüssel 
950 |a Paarungsbasierte Kryptografie 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Datensicherheit 
950 |a Datenverarbeitung 
950 |a Computersicherheit 
950 |a Надёжность сохранения данных 
950 |a Hash-Code 
950 |a Hash-Funktion 
950 |a Hash-Verfahren 
950 |a Schlüsseltransformation 
950 |a Gestreute Speicherung 
950 |a Speicherverwaltung 
950 |a Security Log 
950 |a Security Protocoll 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-14081-5  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:58:55Z  |x epn:333618956X 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-14081-5  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:36:53Z  |x epn:3336189616 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-14081-5  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:35:41Z  |x epn:3336189780 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-14081-5  |9 DE-520 
852 |a DE-520  |z 2010-10-05T14:42:50Z  |x epn:3336189829 
980 |a 1650224346  |b 0  |k 1650224346  |o 330929720 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Information+Security+and+Privacy%3A+15th+Australasian+Conference%2C+ACISP+2010%2C+Sydney%2C+Australia%2C+July+5-7%2C+2010.+Proceedings&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Information+Security+and+Privacy%3A+15th+Australasian+Conference%2C+ACISP+2010%2C+Sydney%2C+Australia%2C+July+5-7%2C+2010.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+6168&rft.au=Steinfeld%2C+Ron&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642140815
SOLR
_version_ 1789360957107994624
access_facet Electronic Resources
author Steinfeld, Ron
author2 Hawkes, Philip
author2_role oth
author2_variant p h ph
author_facet Steinfeld, Ron, Hawkes, Philip
author_role aut
author_sort Steinfeld, Ron
author_variant r s rs
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
ctrlnum (DE-627)1650224346, (DE-576)330929720, (DE-599)BSZ330929720, (OCoLC)682059366, (ZBM)1198.94015, (DE-He213)978-3-642-14081-5, (EBP)040529231
de15_date 2011-05-16T16:36:53Z
doi_str_mv 10.1007/978-3-642-14081-5
era_facet 2010
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll
finc_class_facet Informatik, Mathematik
finc_id_str 0001402056
fincclass_txtF_mv science-computerscience
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2010 Sydney (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Sydney
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6168
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1650224346
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-1650224346
is_hierarchy_title Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
isbn 9783642140815
isbn_isn_mv 9783642140808, 3642140807
issn_isn_mv 1611-3349
kxp_id_str 1650224346
language English
last_indexed 2024-01-28T18:46:27.078Z
local_heading_facet_dezwi2 Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll
marc024a_ct_mv 10.1007/978-3-642-14081-5
match_str steinfeld2010informationsecurityandprivacy15thaustralasianconferenceacisp2010sydneyaustraliajuly572010proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6168
oclc_num 682059366
physical Online-Ressource (XII, 403p. 40 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 330929720
recordtype marcfinc
rsn_id_str_mv (DE-15)2462036
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6168
series2 Lecture Notes in Computer Science ; 6168, SpringerLink ; Bücher
source_id 0
spelling Steinfeld, Ron aut, Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XII, 403p. 40 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6168, SpringerLink Bücher, Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift 2010 Sydney (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, s (DE-588)4323071-4 (DE-627)128104287 (DE-576)211241636 Hash-Algorithmus gnd, s (DE-588)4709127-7 (DE-627)357053206 (DE-576)215560337 Sicherheitsprotokoll gnd, Hawkes, Philip oth, 9783642140808, Buchausg. u.d.T. Information security and privacy Berlin : Springer, 2010 XII, 402 S. (DE-627)627267920 (DE-576)325089183 3642140807 9783642140808, Lecture notes in computer science 6168 6168 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-14081-5 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz330929720cov.jpg V:DE-576 X:springer image/jpeg 20150922163618 Cover, https://zbmath.org/?q=an:1198.94015 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-14081-5 DE-14, DE-14 2011-07-20T14:58:55Z epn:333618956X, http://dx.doi.org/10.1007/978-3-642-14081-5 DE-15, DE-15 2011-05-16T16:36:53Z epn:3336189616, http://dx.doi.org/10.1007/978-3-642-14081-5 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:35:41Z epn:3336189780, http://dx.doi.org/10.1007/978-3-642-14081-5 DE-520, DE-520 2010-10-05T14:42:50Z epn:3336189829
spellingShingle Steinfeld, Ron, Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, Lecture notes in computer science, 6168, Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift 2010 Sydney, Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll
swb_id_str 330929720
title Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
title_auth Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
title_full Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes
title_fullStr Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes
title_full_unstemmed Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes
title_in_hierarchy 6168. Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings (2010)
title_short Information Security and Privacy
title_sort information security and privacy 15th australasian conference acisp 2010 sydney australia july 5 7 2010 proceedings
title_sub 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
title_unstemmed Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
topic Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift 2010 Sydney, Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll
topic_facet Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift, Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll
url https://doi.org/10.1007/978-3-642-14081-5, https://swbplus.bsz-bw.de/bsz330929720cov.jpg, https://zbmath.org/?q=an:1198.94015, http://dx.doi.org/10.1007/978-3-642-14081-5