|
|
|
|
LEADER |
07874cam a22015852 4500 |
001 |
0-1650224346 |
003 |
DE-627 |
005 |
20240122105245.0 |
007 |
cr uuu---uuuuu |
008 |
101005s2010 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642140815
|9 978-3-642-14081-5
|
024 |
7 |
|
|a 10.1007/978-3-642-14081-5
|2 doi
|
035 |
|
|
|a (DE-627)1650224346
|
035 |
|
|
|a (DE-576)330929720
|
035 |
|
|
|a (DE-599)BSZ330929720
|
035 |
|
|
|a (OCoLC)682059366
|
035 |
|
|
|a (ZBM)1198.94015
|
035 |
|
|
|a (DE-He213)978-3-642-14081-5
|
035 |
|
|
|a (EBP)040529231
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a UR
|2 bicssc
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 94A62
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Steinfeld, Ron
|4 aut
|
245 |
1 |
0 |
|a Information Security and Privacy
|b 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings
|c edited by Ron Steinfeld, Philip Hawkes
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010
|
300 |
|
|
|a Online-Ressource (XII, 403p. 40 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 6168
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Computational complexity
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Discrete mathematics.
|
655 |
|
7 |
|a Konferenzschrift
|y 2010
|z Sydney
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4323071-4
|0 (DE-627)128104287
|0 (DE-576)211241636
|a Hash-Algorithmus
|2 gnd
|
689 |
1 |
3 |
|D s
|0 (DE-588)4709127-7
|0 (DE-627)357053206
|0 (DE-576)215560337
|a Sicherheitsprotokoll
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
700 |
1 |
|
|a Hawkes, Philip
|4 oth
|
776 |
1 |
|
|z 9783642140808
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Information security and privacy
|d Berlin : Springer, 2010
|h XII, 402 S.
|w (DE-627)627267920
|w (DE-576)325089183
|z 3642140807
|z 9783642140808
|
830 |
|
0 |
|a Lecture notes in computer science
|v 6168
|9 6168
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-14081-5
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz330929720cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20150922163618
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1198.94015
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2010
|
912 |
|
|
|a ZDB-2-SXCS
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|b 2010
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Kryptographisches System
|
950 |
|
|
|a Verschlüsselungssystem
|
950 |
|
|
|a Chiffriersystem
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Geheimschlüssel
|
950 |
|
|
|a Paarungsbasierte Kryptografie
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Hash-Code
|
950 |
|
|
|a Hash-Funktion
|
950 |
|
|
|a Hash-Verfahren
|
950 |
|
|
|a Schlüsseltransformation
|
950 |
|
|
|a Gestreute Speicherung
|
950 |
|
|
|a Speicherverwaltung
|
950 |
|
|
|a Security Log
|
950 |
|
|
|a Security Protocoll
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-14081-5
|9 DE-14
|
852 |
|
|
|a DE-14
|z 2011-07-20T14:58:55Z
|x epn:333618956X
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-14081-5
|9 DE-15
|
852 |
|
|
|a DE-15
|z 2011-05-16T16:36:53Z
|x epn:3336189616
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-14081-5
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|z 2011-01-26T14:35:41Z
|x epn:3336189780
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-14081-5
|9 DE-520
|
852 |
|
|
|a DE-520
|z 2010-10-05T14:42:50Z
|x epn:3336189829
|
980 |
|
|
|a 1650224346
|b 0
|k 1650224346
|o 330929720
|
SOLR
_version_ |
1789360957107994624 |
access_facet |
Electronic Resources |
author |
Steinfeld, Ron |
author2 |
Hawkes, Philip |
author2_role |
oth |
author2_variant |
p h ph |
author_facet |
Steinfeld, Ron, Hawkes, Philip |
author_role |
aut |
author_sort |
Steinfeld, Ron |
author_variant |
r s rs |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. |
ctrlnum |
(DE-627)1650224346, (DE-576)330929720, (DE-599)BSZ330929720, (OCoLC)682059366, (ZBM)1198.94015, (DE-He213)978-3-642-14081-5, (EBP)040529231 |
de15_date |
2011-05-16T16:36:53Z |
doi_str_mv |
10.1007/978-3-642-14081-5 |
era_facet |
2010 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll |
finc_class_facet |
Informatik, Mathematik |
finc_id_str |
0001402056 |
fincclass_txtF_mv |
science-computerscience |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2010 Sydney (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Sydney |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
6168 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1650224346 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2010 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2010 |
institution |
DE-14, DE-Zi4, DE-520, DE-15 |
is_hierarchy_id |
0-1650224346 |
is_hierarchy_title |
Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings |
isbn |
9783642140815 |
isbn_isn_mv |
9783642140808, 3642140807 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1650224346 |
language |
English |
last_indexed |
2024-01-28T18:46:27.078Z |
local_heading_facet_dezwi2 |
Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll |
marc024a_ct_mv |
10.1007/978-3-642-14081-5 |
match_str |
steinfeld2010informationsecurityandprivacy15thaustralasianconferenceacisp2010sydneyaustraliajuly572010proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)6168 |
oclc_num |
682059366 |
physical |
Online-Ressource (XII, 403p. 40 illus, digital) |
publishDate |
2010 |
publishDateSort |
2010 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
330929720 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)2462036 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 6168 |
series2 |
Lecture Notes in Computer Science ; 6168, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Steinfeld, Ron aut, Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (XII, 403p. 40 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6168, SpringerLink Bücher, Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift 2010 Sydney (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, s (DE-588)4323071-4 (DE-627)128104287 (DE-576)211241636 Hash-Algorithmus gnd, s (DE-588)4709127-7 (DE-627)357053206 (DE-576)215560337 Sicherheitsprotokoll gnd, Hawkes, Philip oth, 9783642140808, Buchausg. u.d.T. Information security and privacy Berlin : Springer, 2010 XII, 402 S. (DE-627)627267920 (DE-576)325089183 3642140807 9783642140808, Lecture notes in computer science 6168 6168 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-14081-5 X:SPRINGER Verlag lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz330929720cov.jpg V:DE-576 X:springer image/jpeg 20150922163618 Cover, https://zbmath.org/?q=an:1198.94015 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-14081-5 DE-14, DE-14 2011-07-20T14:58:55Z epn:333618956X, http://dx.doi.org/10.1007/978-3-642-14081-5 DE-15, DE-15 2011-05-16T16:36:53Z epn:3336189616, http://dx.doi.org/10.1007/978-3-642-14081-5 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:35:41Z epn:3336189780, http://dx.doi.org/10.1007/978-3-642-14081-5 DE-520, DE-520 2010-10-05T14:42:50Z epn:3336189829 |
spellingShingle |
Steinfeld, Ron, Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, Lecture notes in computer science, 6168, Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure -- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems -- On Multidimensional Linear Cryptanalysis -- Side-Channel Analysis of the K2 Stream Cipher -- On Unbiased Linear Approximations -- Hash Functions -- Distinguishers for the Compression Function and Output Transformation of Hamsi-256 -- Second-Preimage Analysis of Reduced SHA-1 -- Some Observations on Indifferentiability -- Public Key Cryptography -- Adaptive and Composable Non-committing Encryptions -- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles -- Strong Knowledge Extractors for Public-Key Encryption Schemes -- A Multi-trapdoor Commitment Scheme from the RSA Assumption -- Identity-Based Chameleon Hash Scheme without Key Exposure -- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key -- Security Estimates for Quadratic Field Based Cryptosystems -- Solving Generalized Small Inverse Problems -- Protocols -- One-Time-Password-Authenticated Key Exchange -- Predicate-Based Key Exchange -- Attribute-Based Authenticated Key Exchange -- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping -- Additive Combinatorics and Discrete Logarithm Based Range Protocols -- Proof-of-Knowledge of Representation of Committed Value and Its Applications -- Network Security -- Pattern Recognition Techniques for the Classification of Malware Packers -- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift 2010 Sydney, Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll |
swb_id_str |
330929720 |
title |
Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings |
title_auth |
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings |
title_full |
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes |
title_fullStr |
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes |
title_full_unstemmed |
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings edited by Ron Steinfeld, Philip Hawkes |
title_in_hierarchy |
6168. Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings (2010) |
title_short |
Information Security and Privacy |
title_sort |
information security and privacy 15th australasian conference acisp 2010 sydney australia july 5 7 2010 proceedings |
title_sub |
15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings |
title_unstemmed |
Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings |
topic |
Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift 2010 Sydney, Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll |
topic_facet |
Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Computer networks ., Electronic data processing, Algorithms., Cryptography., Discrete mathematics., Konferenzschrift, Datensicherung, Computersicherheit, Privatsphäre, Kryptoanalyse, Kryptosystem, Hash-Algorithmus, Sicherheitsprotokoll |
url |
https://doi.org/10.1007/978-3-642-14081-5, https://swbplus.bsz-bw.de/bsz330929720cov.jpg, https://zbmath.org/?q=an:1198.94015, http://dx.doi.org/10.1007/978-3-642-14081-5 |