Eintrag weiter verarbeiten

Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings

Gespeichert in:

Personen und Körperschaften: Bao, Feng (VerfasserIn), Samarati, Pierangela (Sonstige), Zhou, Jianying (Sonstige)
Titel: Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings/ edited by Feng Bao, Pierangela Samarati, Jianying Zhou
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7341
Schlagwörter:
Buchausg. u.d.T.: Applied cryptography and network security, Berlin : Springer, 2012, XIV, 580 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 07777cam a22018492 4500
001 0-1651539073
003 DE-627
005 20240122105055.0
007 cr uuu---uuuuu
008 120704s2012 gw |||||o 00| ||eng c
020 |a 9783642312847  |9 978-3-642-31284-7 
024 7 |a 10.1007/978-3-642-31284-7  |2 doi 
035 |a (DE-627)1651539073 
035 |a (DE-576)367686996 
035 |a (DE-599)BSZ367686996 
035 |a (OCoLC)840010449 
035 |a (OCoLC)851099098 
035 |a (ZBM)1245.94005 
035 |a (ZBM)1245.94005 
035 |a (DE-He213)978-3-642-31284-7 
035 |a (EBP)040542947 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 68P25  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.38  |2 bkl 
084 |a 54.32  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Bao, Feng  |4 aut 
245 1 0 |a Applied Cryptography and Network Security  |b 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings  |c edited by Feng Bao, Pierangela Samarati, Jianying Zhou 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2012 
300 |a Online-Ressource (XIV, 580p. 107 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7341 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data structures (Computer science) 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data protection 
650 0 |a Data structures (Computer science) 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Information Systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Electronic data processing 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Information theory. 
650 0 |a Artificial intelligence 
655 7 |a Konferenzschrift  |y 2012  |z Singapur  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 1 |D s  |0 (DE-588)4209132-9  |0 (DE-627)105106836  |0 (DE-576)210190086  |a Kryptosystem  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4070085-9  |0 (DE-627)104131403  |0 (DE-576)209179252  |a Rechnernetz  |2 gnd 
689 1 1 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 1 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 1 |5 DE-101 
689 2 0 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 2 |5 DE-101 
700 1 |a Samarati, Pierangela  |4 oth 
700 1 |a Zhou, Jianying  |4 oth 
776 1 |z 9783642312830 
776 0 8 |i Buchausg. u.d.T.  |t Applied cryptography and network security  |d Berlin : Springer, 2012  |h XIV, 580 S.  |w (DE-627)71723455X  |w (DE-576)36831247X  |z 3642312837  |z 9783642312830 
830 0 |a Lecture notes in computer science  |v 7341  |9 7341  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-31284-7  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31284-7  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz367686996cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20140131132524  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1245.94005  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
889 |w (DE-627)718776895 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 54.32  |j Rechnerkommunikation  |q SEPA  |0 (DE-627)10640623X 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
951 |a BO 
950 |a Computernetz 
950 |a Computernetzwerk 
950 |a Datenverarbeitung 
950 |a Verbundsystem 
950 |a Mehrrechnernetz 
950 |a Vernetzung 
950 |a Datennetz 
950 |a Mehrrechnersystem 
950 |a Verteiltes System 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Kryptographisches System 
950 |a Verschlüsselungssystem 
950 |a Chiffriersystem 
950 |a Chiffrierung 
950 |a Geheimschlüssel 
950 |a Paarungsbasierte Kryptografie 
950 |a Geheimcodetechnik 
950 |a Kryptografie 
950 |a Kryptographie 
950 |a Datenverschlüsselung 
950 |a Steganographie 
950 |a Kryptologe 
950 |a 保密学 
950 |a 密码学 
950 |a 保密學 
950 |a 密碼學 
950 |a Криптология 
950 |a Datensicherheit 
950 |a Computersicherheit 
950 |a Надёжность сохранения данных 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31284-7  |9 DE-14 
852 |a DE-14  |x epn:3350009379  |z 2012-07-04T16:23:31Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31284-7  |9 DE-15 
852 |a DE-15  |x epn:3350009433  |z 2012-07-04T16:23:31Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31284-7  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3350009492  |z 2012-07-04T16:23:31Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31284-7  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3350009565  |z 2012-07-04T16:23:31Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31284-7  |9 DE-520 
852 |a DE-520  |x epn:335000962X  |z 2012-07-04T16:23:31Z 
980 |a 1651539073  |b 0  |k 1651539073  |o 367686996 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Applied+Cryptography+and+Network+Security%3A+10th+International+Conference%2C+ACNS+2012%2C+Singapore%2C+June+26-29%2C+2012.+Proceedings&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Applied+Cryptography+and+Network+Security%3A+10th+International+Conference%2C+ACNS+2012%2C+Singapore%2C+June+26-29%2C+2012.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+7341&rft.au=Bao%2C+Feng&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642312845
SOLR
_version_ 1792253792160317440
access_facet Electronic Resources
author Bao, Feng
author2 Samarati, Pierangela, Zhou, Jianying
author2_role oth, oth
author2_variant p s ps, j z jz
author_facet Bao, Feng, Samarati, Pierangela, Zhou, Jianying
author_role aut
author_sort Bao, Feng
author_variant f b fb
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
ctrlnum (DE-627)1651539073, (DE-576)367686996, (DE-599)BSZ367686996, (OCoLC)840010449, (OCoLC)851099098, (ZBM)1245.94005, (DE-He213)978-3-642-31284-7, (EBP)040542947
de15_date 2012-07-04T16:23:31Z
dech1_date 2012-07-04T16:23:31Z
doi_str_mv 10.1007/978-3-642-31284-7
era_facet 2012
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2012 Singapur (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Singapur
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7341
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1651539073
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2012
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1651539073
is_hierarchy_title Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
isbn 9783642312847
isbn_isn_mv 9783642312830, 3642312837
issn_isn_mv 1611-3349
kxp_id_str 1651539073
language English
last_indexed 2024-02-29T17:06:48.005Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
marc024a_ct_mv 10.1007/978-3-642-31284-7
match_str bao2012appliedcryptographyandnetworksecurity10thinternationalconferenceacns2012singaporejune26292012proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7341
oclc_num 840010449, 851099098
physical Online-Ressource (XIV, 580p. 107 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 367686996
recordtype marcfinc
rsn_id_str_mv (DE-15)3140151
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7341
series2 Lecture Notes in Computer Science ; 7341, SpringerLink ; Bücher
source_id 0
spelling Bao, Feng aut, Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (XIV, 580p. 107 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7341, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids., Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2012 Singapur (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, DE-101, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, Samarati, Pierangela oth, Zhou, Jianying oth, 9783642312830, Buchausg. u.d.T. Applied cryptography and network security Berlin : Springer, 2012 XIV, 580 S. (DE-627)71723455X (DE-576)36831247X 3642312837 9783642312830, Lecture notes in computer science 7341 7341 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-31284-7 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-31284-7 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz367686996cov.jpg V:DE-576 X:springer image/jpeg 20140131132524 Cover, https://zbmath.org/?q=an:1245.94005 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)718776895, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-14, DE-14 epn:3350009379 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-15, DE-15 epn:3350009433 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-Ch1, DE-Ch1 epn:3350009492 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3350009565 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-520, DE-520 epn:335000962X 2012-07-04T16:23:31Z
spellingShingle Bao, Feng, Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings, Lecture notes in computer science, 7341, This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids., Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2012 Singapur, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
swb_id_str 367686996
title Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
title_auth Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
title_full Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou
title_fullStr Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou
title_full_unstemmed Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou
title_in_hierarchy 7341. Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings (2012)
title_short Applied Cryptography and Network Security
title_sort applied cryptography and network security 10th international conference acns 2012 singapore june 26 29 2012 proceedings
title_sub 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
title_unstemmed Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
topic Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2012 Singapur, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
topic_facet Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
url https://doi.org/10.1007/978-3-642-31284-7, http://dx.doi.org/10.1007/978-3-642-31284-7, https://swbplus.bsz-bw.de/bsz367686996cov.jpg, https://zbmath.org/?q=an:1245.94005