|
|
|
|
LEADER |
07777cam a22018492 4500 |
001 |
0-1651539073 |
003 |
DE-627 |
005 |
20240122105055.0 |
007 |
cr uuu---uuuuu |
008 |
120704s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642312847
|9 978-3-642-31284-7
|
024 |
7 |
|
|a 10.1007/978-3-642-31284-7
|2 doi
|
035 |
|
|
|a (DE-627)1651539073
|
035 |
|
|
|a (DE-576)367686996
|
035 |
|
|
|a (DE-599)BSZ367686996
|
035 |
|
|
|a (OCoLC)840010449
|
035 |
|
|
|a (OCoLC)851099098
|
035 |
|
|
|a (ZBM)1245.94005
|
035 |
|
|
|a (ZBM)1245.94005
|
035 |
|
|
|a (DE-He213)978-3-642-31284-7
|
035 |
|
|
|a (EBP)040542947
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.32
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
100 |
1 |
|
|a Bao, Feng
|4 aut
|
245 |
1 |
0 |
|a Applied Cryptography and Network Security
|b 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
|c edited by Feng Bao, Pierangela Samarati, Jianying Zhou
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012
|
300 |
|
|
|a Online-Ressource (XIV, 580p. 107 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7341
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data structures (Computer science)
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data structures (Computer science)
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Artificial intelligence
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Singapur
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4070085-9
|0 (DE-627)104131403
|0 (DE-576)209179252
|a Rechnernetz
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
2 |
|
|5 DE-101
|
700 |
1 |
|
|a Samarati, Pierangela
|4 oth
|
700 |
1 |
|
|a Zhou, Jianying
|4 oth
|
776 |
1 |
|
|z 9783642312830
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Applied cryptography and network security
|d Berlin : Springer, 2012
|h XIV, 580 S.
|w (DE-627)71723455X
|w (DE-576)36831247X
|z 3642312837
|z 9783642312830
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7341
|9 7341
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-31284-7
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31284-7
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz367686996cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20140131132524
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1245.94005
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)718776895
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.32
|j Rechnerkommunikation
|q SEPA
|0 (DE-627)10640623X
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
951 |
|
|
|a BO
|
950 |
|
|
|a Computernetz
|
950 |
|
|
|a Computernetzwerk
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Verbundsystem
|
950 |
|
|
|a Mehrrechnernetz
|
950 |
|
|
|a Vernetzung
|
950 |
|
|
|a Datennetz
|
950 |
|
|
|a Mehrrechnersystem
|
950 |
|
|
|a Verteiltes System
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Kryptographisches System
|
950 |
|
|
|a Verschlüsselungssystem
|
950 |
|
|
|a Chiffriersystem
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Geheimschlüssel
|
950 |
|
|
|a Paarungsbasierte Kryptografie
|
950 |
|
|
|a Geheimcodetechnik
|
950 |
|
|
|a Kryptografie
|
950 |
|
|
|a Kryptographie
|
950 |
|
|
|a Datenverschlüsselung
|
950 |
|
|
|a Steganographie
|
950 |
|
|
|a Kryptologe
|
950 |
|
|
|a 保密学
|
950 |
|
|
|a 密码学
|
950 |
|
|
|a 保密學
|
950 |
|
|
|a 密碼學
|
950 |
|
|
|a Криптология
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31284-7
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3350009379
|z 2012-07-04T16:23:31Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31284-7
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3350009433
|z 2012-07-04T16:23:31Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31284-7
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3350009492
|z 2012-07-04T16:23:31Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31284-7
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3350009565
|z 2012-07-04T16:23:31Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31284-7
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:335000962X
|z 2012-07-04T16:23:31Z
|
980 |
|
|
|a 1651539073
|b 0
|k 1651539073
|o 367686996
|
SOLR
_version_ |
1792253792160317440 |
access_facet |
Electronic Resources |
author |
Bao, Feng |
author2 |
Samarati, Pierangela, Zhou, Jianying |
author2_role |
oth, oth |
author2_variant |
p s ps, j z jz |
author_facet |
Bao, Feng, Samarati, Pierangela, Zhou, Jianying |
author_role |
aut |
author_sort |
Bao, Feng |
author_variant |
f b fb |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids. |
ctrlnum |
(DE-627)1651539073, (DE-576)367686996, (DE-599)BSZ367686996, (OCoLC)840010449, (OCoLC)851099098, (ZBM)1245.94005, (DE-He213)978-3-642-31284-7, (EBP)040542947 |
de15_date |
2012-07-04T16:23:31Z |
dech1_date |
2012-07-04T16:23:31Z |
doi_str_mv |
10.1007/978-3-642-31284-7 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Singapur (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Singapur |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7341 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651539073 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651539073 |
is_hierarchy_title |
Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings |
isbn |
9783642312847 |
isbn_isn_mv |
9783642312830, 3642312837 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651539073 |
language |
English |
last_indexed |
2024-02-29T17:06:48.005Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
marc024a_ct_mv |
10.1007/978-3-642-31284-7 |
match_str |
bao2012appliedcryptographyandnetworksecurity10thinternationalconferenceacns2012singaporejune26292012proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7341 |
oclc_num |
840010449, 851099098 |
physical |
Online-Ressource (XIV, 580p. 107 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
367686996 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3140151 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7341 |
series2 |
Lecture Notes in Computer Science ; 7341, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Bao, Feng aut, Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (XIV, 580p. 107 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7341, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids., Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2012 Singapur (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, DE-101, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, Samarati, Pierangela oth, Zhou, Jianying oth, 9783642312830, Buchausg. u.d.T. Applied cryptography and network security Berlin : Springer, 2012 XIV, 580 S. (DE-627)71723455X (DE-576)36831247X 3642312837 9783642312830, Lecture notes in computer science 7341 7341 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-31284-7 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-31284-7 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz367686996cov.jpg V:DE-576 X:springer image/jpeg 20140131132524 Cover, https://zbmath.org/?q=an:1245.94005 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)718776895, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-14, DE-14 epn:3350009379 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-15, DE-15 epn:3350009433 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-Ch1, DE-Ch1 epn:3350009492 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3350009565 2012-07-04T16:23:31Z, http://dx.doi.org/10.1007/978-3-642-31284-7 DE-520, DE-520 epn:335000962X 2012-07-04T16:23:31Z |
spellingShingle |
Bao, Feng, Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings, Lecture notes in computer science, 7341, This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids., Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2012 Singapur, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
swb_id_str |
367686996 |
title |
Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings |
title_auth |
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings |
title_full |
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou |
title_fullStr |
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou |
title_full_unstemmed |
Applied Cryptography and Network Security 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings edited by Feng Bao, Pierangela Samarati, Jianying Zhou |
title_in_hierarchy |
7341. Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings (2012) |
title_short |
Applied Cryptography and Network Security |
title_sort |
applied cryptography and network security 10th international conference acns 2012 singapore june 26 29 2012 proceedings |
title_sub |
10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings |
title_unstemmed |
Applied Cryptography and Network Security: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings |
topic |
Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2012 Singapur, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
topic_facet |
Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
url |
https://doi.org/10.1007/978-3-642-31284-7, http://dx.doi.org/10.1007/978-3-642-31284-7, https://swbplus.bsz-bw.de/bsz367686996cov.jpg, https://zbmath.org/?q=an:1245.94005 |