Eintrag weiter verarbeiten

Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings

Gespeichert in:

Personen und Körperschaften: Boyd, Colin (VerfasserIn), Simpson, Leonie (Sonstige)
Titel: Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings/ edited by Colin Boyd, Leonie Simpson
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2013
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7959
Schlagwörter:
Druckausg.: Information security and privacy, Berlin : Springer, 2013, XI, 434 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 07705cam a22018012 4500
001 0-1652501258
003 DE-627
005 20240122104923.0
007 cr uuu---uuuuu
008 130705s2013 gw |||||o 00| ||eng c
020 |a 9783642390593  |9 978-3-642-39059-3 
024 7 |a 10.1007/978-3-642-39059-3  |2 doi 
035 |a (DE-627)1652501258 
035 |a (DE-576)386845247 
035 |a (DE-599)BSZ386845247 
035 |a (OCoLC)855544099 
035 |a (ZBM)1264.94003 
035 |a (ZBM)1264.94003 
035 |a (DE-He213)978-3-642-39059-3 
035 |a (EBP)040549097 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 94A62  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.38  |2 bkl 
084 |a 54.10  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Boyd, Colin  |4 aut 
245 1 0 |a Information Security and Privacy  |b 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings  |c edited by Colin Boyd, Leonie Simpson 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2013 
300 |a Online-Ressource (XII, 437 p. 70 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7959 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing 
650 0 |a Computer science 
650 0 |a Information systems 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Information systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Electronic data processing 
650 0 |a Cryptography. 
650 0 |a Information theory. 
650 0 |a Information technology 
650 0 |a Electronic commerce. 
655 7 |a Konferenzschrift  |y 2013  |z Brisbane  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 0 1 |D s  |0 (DE-588)4323071-4  |0 (DE-627)128104287  |0 (DE-576)211241636  |a Hash-Algorithmus  |2 gnd 
689 0 2 |D s  |0 (DE-588)4209133-0  |0 (DE-627)105106828  |0 (DE-576)210190094  |a Public-Key-Kryptosystem  |2 gnd 
689 0 3 |D s  |0 (DE-588)4352893-4  |0 (DE-627)18124361X  |0 (DE-576)211544183  |a Chiffrierung  |2 gnd 
689 0 4 |D s  |0 (DE-588)4660818-7  |0 (DE-627)336841558  |0 (DE-576)214764249  |a Secret-Sharing  |2 gnd 
689 0 5 |D s  |0 (DE-588)4269037-7  |0 (DE-627)104527161  |0 (DE-576)210661984  |a Elektronische Unterschrift  |2 gnd 
689 0 5 |D s  |0 (DE-588)4330656-1  |0 (DE-627)133218872  |0 (DE-576)211314684  |a Authentifikation  |2 gnd 
689 0 5 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 0 |5 DE-101 
700 1 |a Simpson, Leonie  |4 oth 
776 1 |z 9783642390586 
776 0 8 |i Druckausg.  |t Information security and privacy  |d Berlin : Springer, 2013  |h XI, 434 S.  |w (DE-627)747730474  |w (DE-576)401386406  |z 3642390587  |z 9783642390586 
830 0 |a Lecture notes in computer science  |v 7959  |9 7959  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-39059-3  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39059-3  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz386845247cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20140212094110  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1264.94003  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
889 |w (DE-627)751297089 
912 |a ZDB-2-LNC  |b 2013 
912 |a ZDB-2-SCS  |b 2013 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2013 
912 |a ZDB-2-SEB  |b 2013 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 54.10  |j Theoretische Informatik  |q SEPA  |0 (DE-627)106418815 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
951 |a BO 
950 |a Digital signature 
950 |a Digitale Unterschrift 
950 |a Digitale Signatur 
950 |a Elektronische Signatur 
950 |a Unterschrift 
950 |a Öffentlicher Schlüssel 
950 |a Kryptosystem 
950 |a Offenes Verschlüsselungssystem 
950 |a Asymmetrisches Kryptosystem 
950 |a Zwei-Schlüssel-System 
950 |a System mit allbekannten Schlüsseln 
950 |a Two-Key-Kryptosystem 
950 |a Asymmetrisches Verschlüsselungssystem 
950 |a Öffentliches Schlüsselsystem 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Hash-Code 
950 |a Hash-Funktion 
950 |a Hash-Verfahren 
950 |a Schlüsseltransformation 
950 |a Gestreute Speicherung 
950 |a Speicherverwaltung 
950 |a Authentizitätsprüfung 
950 |a Authentikation 
950 |a Authentifizierung 
950 |a Authentication 
950 |a Authentisierung 
950 |a Zugriffskontrolle 
950 |a Verschlüsselung 
950 |a Encryption 
950 |a Kryptologie 
950 |a Dechiffrierung 
950 |a Steganographie 
950 |a Шифровка 
950 |a Secret sharing 
950 |a Betrügererkennung 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39059-3  |9 DE-14 
852 |a DE-14  |x epn:336050853X  |z 2013-07-05T09:11:39Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39059-3  |9 DE-15 
852 |a DE-15  |x epn:3360508564  |z 2013-07-05T09:11:39Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39059-3  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3360508602  |z 2013-07-05T09:11:39Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39059-3  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3360508637  |z 2013-07-05T09:11:39Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-39059-3  |9 DE-520 
852 |a DE-520  |x epn:3360508661  |z 2013-07-05T09:11:39Z 
980 |a 1652501258  |b 0  |k 1652501258  |o 386845247 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Information+Security+and+Privacy%3A+18th+Australasian+Conference%2C+ACISP+2013%2C+Brisbane%2C+Australia%2C+July+1-3%2C+2013.+Proceedings&rft.date=2013&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Information+Security+and+Privacy%3A+18th+Australasian+Conference%2C+ACISP+2013%2C+Brisbane%2C+Australia%2C+July+1-3%2C+2013.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+7959&rft.au=Boyd%2C+Colin&rft.pub=Springer&rft.edition=&rft.isbn=3642390595
SOLR
_version_ 1792258612971700224
access_facet Electronic Resources
author Boyd, Colin
author2 Simpson, Leonie
author2_role oth
author2_variant l s ls
author_facet Boyd, Colin, Simpson, Leonie
author_role aut
author_sort Boyd, Colin
author_variant c b cb
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing
ctrlnum (DE-627)1652501258, (DE-576)386845247, (DE-599)BSZ386845247, (OCoLC)855544099, (ZBM)1264.94003, (DE-He213)978-3-642-39059-3, (EBP)040549097
de15_date 2013-07-05T09:11:39Z
dech1_date 2013-07-05T09:11:39Z
doi_str_mv 10.1007/978-3-642-39059-3
era_facet 2013
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2013 Brisbane (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Brisbane
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7959
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1652501258
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2013
imprint_str_mv Berlin, Heidelberg: Springer, 2013
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1652501258
is_hierarchy_title Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
isbn 9783642390593
isbn_isn_mv 9783642390586, 3642390587
issn_isn_mv 1611-3349
kxp_id_str 1652501258
language English
last_indexed 2024-02-29T18:23:25.127Z
local_heading_facet_dezwi2 Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre
marc024a_ct_mv 10.1007/978-3-642-39059-3
match_str boyd2013informationsecurityandprivacy18thaustralasianconferenceacisp2013brisbaneaustraliajuly132013proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7959
oclc_num 855544099
physical Online-Ressource (XII, 437 p. 70 illus, digital)
publishDate 2013
publishDateSort 2013
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 386845247
recordtype marcfinc
rsn_id_str_mv (DE-15)3231566
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7959
series2 Lecture Notes in Computer Science ; 7959, SpringerLink ; Bücher
source_id 0
spelling Boyd, Colin aut, Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson, Berlin, Heidelberg Springer 2013, Online-Ressource (XII, 437 p. 70 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7959, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing, Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift 2013 Brisbane (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4323071-4 (DE-627)128104287 (DE-576)211241636 Hash-Algorithmus gnd, s (DE-588)4209133-0 (DE-627)105106828 (DE-576)210190094 Public-Key-Kryptosystem gnd, s (DE-588)4352893-4 (DE-627)18124361X (DE-576)211544183 Chiffrierung gnd, s (DE-588)4660818-7 (DE-627)336841558 (DE-576)214764249 Secret-Sharing gnd, s (DE-588)4269037-7 (DE-627)104527161 (DE-576)210661984 Elektronische Unterschrift gnd, s (DE-588)4330656-1 (DE-627)133218872 (DE-576)211314684 Authentifikation gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, DE-101, Simpson, Leonie oth, 9783642390586, Druckausg. Information security and privacy Berlin : Springer, 2013 XI, 434 S. (DE-627)747730474 (DE-576)401386406 3642390587 9783642390586, Lecture notes in computer science 7959 7959 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-39059-3 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-39059-3 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz386845247cov.jpg V:DE-576 X:springer image/jpeg 20140212094110 Cover, https://zbmath.org/?q=an:1264.94003 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)751297089, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-14, DE-14 epn:336050853X 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-15, DE-15 epn:3360508564 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-Ch1, DE-Ch1 epn:3360508602 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3360508637 2013-07-05T09:11:39Z, http://dx.doi.org/10.1007/978-3-642-39059-3 DE-520, DE-520 epn:3360508661 2013-07-05T09:11:39Z
spellingShingle Boyd, Colin, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, Lecture notes in computer science, 7959, This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing, Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift 2013 Brisbane, Konferenzschrift, Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre
swb_id_str 386845247
title Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
title_auth Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
title_full Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson
title_fullStr Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson
title_full_unstemmed Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings edited by Colin Boyd, Leonie Simpson
title_in_hierarchy 7959. Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings (2013)
title_short Information Security and Privacy
title_sort information security and privacy 18th australasian conference acisp 2013 brisbane australia july 1 3 2013 proceedings
title_sub 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
title_unstemmed Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings
topic Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift 2013 Brisbane, Konferenzschrift, Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre
topic_facet Computer science, Information systems, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Cryptography., Information theory., Information technology, Electronic commerce., Konferenzschrift, Kryptoanalyse, Hash-Algorithmus, Public-Key-Kryptosystem, Chiffrierung, Secret-Sharing, Elektronische Unterschrift, Authentifikation, Privatsphäre
url https://doi.org/10.1007/978-3-642-39059-3, http://dx.doi.org/10.1007/978-3-642-39059-3, https://swbplus.bsz-bw.de/bsz386845247cov.jpg, https://zbmath.org/?q=an:1264.94003