Eintrag weiter verarbeiten

Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers

Gespeichert in:

Personen und Körperschaften: Kim, Howon (VerfasserIn)
Titel: Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers/ edited by Howon Kim
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7259
Schlagwörter:
Buchausg. u.d.T.: ICISC (14. : 2011 : Seoul), Information security and cryptology - ICISC 2011, Berlin : Springer, 2012, XII, 512 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 09044cam a22020172 4500
001 0-1651637156
003 DE-627
005 20240122105044.0
007 cr uuu---uuuuu
008 120801s2012 gw |||||o 00| ||eng c
020 |a 9783642319129  |9 978-3-642-31912-9 
024 7 |a 10.1007/978-3-642-31912-9  |2 doi 
035 |a (DE-627)1651637156 
035 |a (DE-576)369428226 
035 |a (DE-599)BSZ369428226 
035 |a (OCoLC)809042305 
035 |a (ZBM)1248.68040 
035 |a (ZBM)1248.68040 
035 |a (DE-He213)978-3-642-31912-9 
035 |a (EBP)04054351X 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *68-06  |2 msc 
084 |a 94-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.38  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Kim, Howon  |4 aut 
245 1 0 |a Information Security and Cryptology - ICISC 2011  |b 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers  |c edited by Howon Kim 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2012 
300 |a Online-Ressource (XII, 512 p. 98 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7259 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol. 
520 |a This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol. 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Computational complexity 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer software 
650 0 |a Computational complexity 
650 0 |a Information Systems 
650 0 |a Computer science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Electronic data processing 
650 0 |a Algorithms. 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Discrete mathematics. 
655 7 |a Konferenzschrift  |y 2011  |z Seoul  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 1 1 |D s  |0 (DE-588)4317451-6  |0 (DE-627)126769745  |0 (DE-576)211192988  |a Private-Key-Kryptosystem  |2 gnd 
689 1 2 |D s  |0 (DE-588)4323071-4  |0 (DE-627)128104287  |0 (DE-576)211241636  |a Hash-Algorithmus  |2 gnd 
689 1 |5 DE-101 
689 2 0 |D s  |0 (DE-588)4070085-9  |0 (DE-627)104131403  |0 (DE-576)209179252  |a Rechnernetz  |2 gnd 
689 2 1 |D s  |0 (DE-588)4709127-7  |0 (DE-627)357053206  |0 (DE-576)215560337  |a Sicherheitsprotokoll  |2 gnd 
689 2 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 2 3 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 2 |5 DE-101 
689 3 0 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 3 1 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 3 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 3 3 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 3 |5 (DE-627) 
776 1 |z 9783642319112 
776 0 8 |i Buchausg. u.d.T.  |a ICISC (14. : 2011 : Seoul)  |t Information security and cryptology - ICISC 2011  |d Berlin : Springer, 2012  |h XII, 512 S.  |w (DE-627)718838815  |w (DE-576)379598906  |z 3642319114  |z 9783642319112 
830 0 |a Lecture notes in computer science  |v 7259  |9 7259  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-31912-9  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz369428226cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20130405112855  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1248.68040  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
856 4 2 |u http://deposit.d-nb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm  |m X: MVB  |q text/html  |v 2013-05-01  |x Verlag  |3 Inhaltstext 
856 4 2 |u http://d-nb.info/1023650924/04  |m B:DE-101  |q application/pdf  |v 2013-05-01  |x Verlag  |3 Inhaltsverzeichnis 
889 |w (DE-627)722257805 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
951 |a BO 
950 |a Computernetz 
950 |a Computernetzwerk 
950 |a Datenverarbeitung 
950 |a Verbundsystem 
950 |a Mehrrechnernetz 
950 |a Vernetzung 
950 |a Datennetz 
950 |a Mehrrechnersystem 
950 |a Verteiltes System 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Geheimcodetechnik 
950 |a Kryptografie 
950 |a Kryptographie 
950 |a Datenverschlüsselung 
950 |a Chiffrierung 
950 |a Steganographie 
950 |a Kryptologe 
950 |a 保密学 
950 |a 密码学 
950 |a 保密學 
950 |a 密碼學 
950 |a Криптология 
950 |a Datensicherheit 
950 |a Computersicherheit 
950 |a Надёжность сохранения данных 
950 |a Geheimer Schlüssel 
950 |a Kryptosystem 
950 |a System mit geheimen Schlüsseln 
950 |a Secret Key Encryption 
950 |a Einschlüsselsystem 
950 |a Symmetrisches Kryptosystem 
950 |a Hash-Code 
950 |a Hash-Funktion 
950 |a Hash-Verfahren 
950 |a Schlüsseltransformation 
950 |a Gestreute Speicherung 
950 |a Speicherverwaltung 
950 |a Security Log 
950 |a Security Protocoll 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |9 DE-14 
852 |a DE-14  |x epn:3351397208  |z 2012-08-01T10:10:50Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |9 DE-15 
852 |a DE-15  |x epn:3351397267  |z 2012-08-01T10:10:50Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3351397291  |z 2012-08-01T10:10:50Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3351397348  |z 2012-08-01T10:10:50Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |9 DE-520 
852 |a DE-520  |x epn:3351397410  |z 2012-08-01T10:10:50Z 
980 |a 1651637156  |b 0  |k 1651637156  |o 369428226 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Information+Security+and+Cryptology+-+ICISC+2011%3A+14th+International+Conference%2C+Seoul%2C+Korea%2C+November+30+-+December+2%2C+2011.+Revised+Selected+Papers&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Information+Security+and+Cryptology+-+ICISC+2011%3A+14th+International+Conference%2C+Seoul%2C+Korea%2C+November+30+-+December+2%2C+2011.+Revised+Selected+Papers&rft.series=Lecture+notes+in+computer+science%2C+7259&rft.au=Kim%2C+Howon&rft.pub=Springer&rft.edition=&rft.isbn=3642319122
SOLR
_version_ 1792253797823676416
access_facet Electronic Resources
author Kim, Howon
author_facet Kim, Howon
author_role aut
author_sort Kim, Howon
author_variant h k hk
callnumber-first T - Technology
callnumber-label TK5105
callnumber-raw TK5105.5-5105.9
callnumber-search TK5105.5-5105.9
callnumber-sort TK 45105.5 45105.9
callnumber-subject TK - Electrical and Nuclear Engineering
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol., This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.
ctrlnum (DE-627)1651637156, (DE-576)369428226, (DE-599)BSZ369428226, (OCoLC)809042305, (ZBM)1248.68040, (DE-He213)978-3-642-31912-9, (EBP)04054351X
de15_date 2012-08-01T10:10:50Z
dech1_date 2012-08-01T10:10:50Z
doi_str_mv 10.1007/978-3-642-31912-9
era_facet 2011
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung
finc_class_facet Informatik, Technik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2011 Seoul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Seoul
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7259
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1651637156
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2012
imprint_str_mv Berlin, Heidelberg: Springer, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1651637156
is_hierarchy_title Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
isbn 9783642319129
isbn_isn_mv 9783642319112, 3642319114
issn_isn_mv 1611-3349
kxp_id_str 1651637156
language English
last_indexed 2024-02-29T17:06:55.008Z
local_heading_facet_dezwi2 Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung
marc024a_ct_mv 10.1007/978-3-642-31912-9
match_str kim2012informationsecurityandcryptologyicisc201114thinternationalconferenceseoulkoreanovember30december22011revisedselectedpapers
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7259
oclc_num 809042305
physical Online-Ressource (XII, 512 p. 98 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 369428226
recordtype marcfinc
rsn_id_str_mv (DE-15)3150180
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7259
series2 Lecture Notes in Computer Science ; 7259, SpringerLink ; Bücher
source_id 0
spelling Kim, Howon aut, Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim, Berlin, Heidelberg Springer 2012, Online-Ressource (XII, 512 p. 98 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7259, SpringerLink Bücher, Literaturangaben, Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol., This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift 2011 Seoul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4317451-6 (DE-627)126769745 (DE-576)211192988 Private-Key-Kryptosystem gnd, s (DE-588)4323071-4 (DE-627)128104287 (DE-576)211241636 Hash-Algorithmus gnd, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4709127-7 (DE-627)357053206 (DE-576)215560337 Sicherheitsprotokoll gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, (DE-627), 9783642319112, Buchausg. u.d.T. ICISC (14. : 2011 : Seoul) Information security and cryptology - ICISC 2011 Berlin : Springer, 2012 XII, 512 S. (DE-627)718838815 (DE-576)379598906 3642319114 9783642319112, Lecture notes in computer science 7259 7259 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-31912-9 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-31912-9 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz369428226cov.jpg V:DE-576 X:springer image/jpeg 20130405112855 Cover, https://zbmath.org/?q=an:1248.68040 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1023650924/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, (DE-627)722257805, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-14, DE-14 epn:3351397208 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-15, DE-15 epn:3351397267 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-Ch1, DE-Ch1 epn:3351397291 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3351397348 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-520, DE-520 epn:3351397410 2012-08-01T10:10:50Z
spellingShingle Kim, Howon, Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers, Lecture notes in computer science, 7259, Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol., This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift 2011 Seoul, Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung
swb_id_str 369428226
title Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
title_auth Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
title_full Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim
title_fullStr Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim
title_full_unstemmed Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim
title_in_hierarchy 7259. Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers (2012)
title_short Information Security and Cryptology - ICISC 2011
title_sort information security and cryptology icisc 2011 14th international conference seoul korea november 30 december 2 2011 revised selected papers
title_sub 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
title_unstemmed Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
topic Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift 2011 Seoul, Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung
topic_facet Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift, Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung
url https://doi.org/10.1007/978-3-642-31912-9, http://dx.doi.org/10.1007/978-3-642-31912-9, https://swbplus.bsz-bw.de/bsz369428226cov.jpg, https://zbmath.org/?q=an:1248.68040, http://deposit.d-nb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1023650924/04