|
|
|
|
LEADER |
07705cam a22018012 4500 |
001 |
0-1652501258 |
003 |
DE-627 |
005 |
20240122104923.0 |
007 |
cr uuu---uuuuu |
008 |
130705s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642390593
|9 978-3-642-39059-3
|
024 |
7 |
|
|a 10.1007/978-3-642-39059-3
|2 doi
|
035 |
|
|
|a (DE-627)1652501258
|
035 |
|
|
|a (DE-576)386845247
|
035 |
|
|
|a (DE-599)BSZ386845247
|
035 |
|
|
|a (OCoLC)855544099
|
035 |
|
|
|a (ZBM)1264.94003
|
035 |
|
|
|a (ZBM)1264.94003
|
035 |
|
|
|a (DE-He213)978-3-642-39059-3
|
035 |
|
|
|a (EBP)040549097
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 94A62
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.10
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
100 |
1 |
|
|a Boyd, Colin
|4 aut
|
245 |
1 |
0 |
|a Information Security and Privacy
|b 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
|c edited by Colin Boyd, Leonie Simpson
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (XII, 437 p. 70 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7959
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Information technology
|
650 |
|
0 |
|a Electronic commerce.
|
655 |
|
7 |
|a Konferenzschrift
|y 2013
|z Brisbane
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4323071-4
|0 (DE-627)128104287
|0 (DE-576)211241636
|a Hash-Algorithmus
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4209133-0
|0 (DE-627)105106828
|0 (DE-576)210190094
|a Public-Key-Kryptosystem
|2 gnd
|
689 |
0 |
3 |
|D s
|0 (DE-588)4352893-4
|0 (DE-627)18124361X
|0 (DE-576)211544183
|a Chiffrierung
|2 gnd
|
689 |
0 |
4 |
|D s
|0 (DE-588)4660818-7
|0 (DE-627)336841558
|0 (DE-576)214764249
|a Secret-Sharing
|2 gnd
|
689 |
0 |
5 |
|D s
|0 (DE-588)4269037-7
|0 (DE-627)104527161
|0 (DE-576)210661984
|a Elektronische Unterschrift
|2 gnd
|
689 |
0 |
5 |
|D s
|0 (DE-588)4330656-1
|0 (DE-627)133218872
|0 (DE-576)211314684
|a Authentifikation
|2 gnd
|
689 |
0 |
5 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Simpson, Leonie
|4 oth
|
776 |
1 |
|
|z 9783642390586
|
776 |
0 |
8 |
|i Druckausg.
|t Information security and privacy
|d Berlin : Springer, 2013
|h XI, 434 S.
|w (DE-627)747730474
|w (DE-576)401386406
|z 3642390587
|z 9783642390586
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7959
|9 7959
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-39059-3
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-39059-3
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz386845247cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20140212094110
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1264.94003
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)751297089
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.10
|j Theoretische Informatik
|q SEPA
|0 (DE-627)106418815
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
951 |
|
|
|a BO
|
950 |
|
|
|a Digital signature
|
950 |
|
|
|a Digitale Unterschrift
|
950 |
|
|
|a Digitale Signatur
|
950 |
|
|
|a Elektronische Signatur
|
950 |
|
|
|a Unterschrift
|
950 |
|
|
|a Öffentlicher Schlüssel
|
950 |
|
|
|a Kryptosystem
|
950 |
|
|
|a Offenes Verschlüsselungssystem
|
950 |
|
|
|a Asymmetrisches Kryptosystem
|
950 |
|
|
|a Zwei-Schlüssel-System
|
950 |
|
|
|a System mit allbekannten Schlüsseln
|
950 |
|
|
|a Two-Key-Kryptosystem
|
950 |
|
|
|a Asymmetrisches Verschlüsselungssystem
|
950 |
|
|
|a Öffentliches Schlüsselsystem
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Hash-Code
|
950 |
|
|
|a Hash-Funktion
|
950 |
|
|
|a Hash-Verfahren
|
950 |
|
|
|a Schlüsseltransformation
|
950 |
|
|
|a Gestreute Speicherung
|
950 |
|
|
|a Speicherverwaltung
|
950 |
|
|
|a Authentizitätsprüfung
|
950 |
|
|
|a Authentikation
|
950 |
|
|
|a Authentifizierung
|
950 |
|
|
|a Authentication
|
950 |
|
|
|a Authentisierung
|
950 |
|
|
|a Zugriffskontrolle
|
950 |
|
|
|a Verschlüsselung
|
950 |
|
|
|a Encryption
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
950 |
|
|
|a Steganographie
|
950 |
|
|
|a Шифровка
|
950 |
|
|
|a Secret sharing
|
950 |
|
|
|a Betrügererkennung
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-39059-3
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:336050853X
|z 2013-07-05T09:11:39Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-39059-3
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3360508564
|z 2013-07-05T09:11:39Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-39059-3
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3360508602
|z 2013-07-05T09:11:39Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-39059-3
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3360508637
|z 2013-07-05T09:11:39Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-39059-3
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3360508661
|z 2013-07-05T09:11:39Z
|
980 |
|
|
|a 1652501258
|b 0
|k 1652501258
|o 386845247
|
SOLR
_version_ |
1792258612971700224 |
access_facet |
Electronic Resources |
author |
Boyd, Colin |
author2 |
Simpson, Leonie |
author2_role |
oth |
author2_variant |
l s ls |
author_facet |
Boyd, Colin, Simpson, Leonie |
author_role |
aut |
author_sort |
Boyd, Colin |
author_variant |
c b cb |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing |
ctrlnum |
(DE-627)1652501258, (DE-576)386845247, (DE-599)BSZ386845247, (OCoLC)855544099, (ZBM)1264.94003, (DE-He213)978-3-642-39059-3, (EBP)040549097 |
de15_date |
2013-07-05T09:11:39Z |
dech1_date |
2013-07-05T09:11:39Z |
doi_str_mv |
10.1007/978-3-642-39059-3 |
era_facet |
2013 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2013 Brisbane (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Brisbane |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7959 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1652501258 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1652501258 |
is_hierarchy_title |
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings |
isbn |
9783642390593 |
isbn_isn_mv |
9783642390586, 3642390587 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1652501258 |
language |
English |
last_indexed |
2024-02-29T18:23:25.127Z |
local_heading_facet_dezwi2 |
Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre |
marc024a_ct_mv |
10.1007/978-3-642-39059-3 |
match_str |
boyd2013informationsecurityandprivacy18thaustralasianconferenceacisp2013brisbaneaustraliajuly132013proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7959 |
oclc_num |
855544099 |
physical |
Online-Ressource (XII, 437 p. 70 illus, digital) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
386845247 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3231566 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7959 |
series2 |
Lecture Notes in Computer Science ; 7959, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Boyd, Colin aut, Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson, Berlin, Heidelberg Springer 2013, Online-Ressource (XII, 437 p. 70 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7959, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing, Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift 2013 Brisbane (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4323071-4 (DE-627)128104287 (DE-576)211241636 Hash-Algorithmus gnd, s (DE-588)4209133-0 (DE-627)105106828 (DE-576)210190094 Public-Key-Kryptosystem gnd, s (DE-588)4352893-4 (DE-627)18124361X (DE-576)211544183 Chiffrierung gnd, s (DE-588)4660818-7 (DE-627)336841558 (DE-576)214764249 Secret-Sharing gnd, s (DE-588)4269037-7 (DE-627)104527161 (DE-576)210661984 Elektronische Unterschrift gnd, s (DE-588)4330656-1 (DE-627)133218872 (DE-576)211314684 Authentifikation gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, Simpson, Leonie oth, 9783642390586, Druckausg. Information security and privacy Berlin : Springer, 2013 XI, 434 S. (DE-627)747730474 (DE-576)401386406 3642390587 9783642390586, Lecture notes in computer science 7959 7959 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-39059-3 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-39059-3 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz386845247cov.jpg V:DE-576 X:springer image/jpeg 20140212094110 Cover, https://zbmath.org/?q=an:1264.94003 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)751297089, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-14, DE-14 epn:336050853X 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-15, DE-15 epn:3360508564 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-Ch1, DE-Ch1 epn:3360508602 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3360508637 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-520, DE-520 epn:3360508661 2013-07-05T09:11:39Z |
spellingShingle |
Boyd, Colin, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, Lecture notes in computer science, 7959, This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing, Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift 2013 Brisbane, Konferenzschrift, Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre |
swb_id_str |
386845247 |
title |
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings |
title_auth |
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings |
title_full |
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson |
title_fullStr |
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson |
title_full_unstemmed |
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson |
title_in_hierarchy |
7959. Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings (2013) |
title_short |
Information Security and Privacy |
title_sort |
information security and privacy 18th australasian conference acisp 2013 brisbane australia july 1 3 2013 proceedings |
title_sub |
18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings |
title_unstemmed |
Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings |
topic |
Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift 2013 Brisbane, Konferenzschrift, Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre |
topic_facet |
Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift, Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre |
url |
https://doi.org/10.1007/978-3-642-39059-3, http://dx.doi.org/10.1007/978-3-642-39059-3, https://swbplus.bsz-bw.de/bsz386845247cov.jpg, https://zbmath.org/?q=an:1264.94003 |