|
|
|
|
LEADER |
08203cam a22019452 4500 |
001 |
0-1652501789 |
003 |
DE-627 |
005 |
20240122104923.0 |
007 |
cr uuu---uuuuu |
008 |
130705s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642389801
|9 978-3-642-38980-1
|
024 |
7 |
|
|a 10.1007/978-3-642-38980-1
|2 doi
|
035 |
|
|
|a (DE-627)1652501789
|
035 |
|
|
|a (DE-576)386845794
|
035 |
|
|
|a (DE-599)BSZ386845794
|
035 |
|
|
|a (OCoLC)855544164
|
035 |
|
|
|a (ZBM)1277.94003
|
035 |
|
|
|a (ZBM)1277.94003
|
035 |
|
|
|a (DE-He213)978-3-642-38980-1
|
035 |
|
|
|a (EBP)040549046
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.32
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
100 |
1 |
|
|a Jacobson, Michael J.
|d 1971-
|0 (DE-588)121455610
|0 (DE-627)081319576
|0 (DE-576)292720882
|4 aut
|
245 |
1 |
0 |
|a Applied Cryptography and Network Security
|b 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
|c edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (XIV, 572 p. 115 illus, online resource)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7954
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data structures (Computer science)
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data structures (Computer science)
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Coding theory
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Artificial intelligence
|
655 |
|
7 |
|a Konferenzschrift
|y 2013
|z Banff, Alberta
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4070085-9
|0 (DE-627)104131403
|0 (DE-576)209179252
|a Rechnernetz
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
2 |
|
|5 DE-101
|
700 |
1 |
|
|a Locasto, Michael
|e Hrsg.
|4 edt
|
700 |
1 |
|
|a Mohassel, Payman
|e Hrsg.
|4 edt
|
700 |
1 |
|
|a Safavi-Naini, Reihaneh
|e Hrsg.
|0 (DE-627)1325191841
|0 (DE-576)255191847
|4 edt
|
776 |
1 |
|
|z 9783642389795
|
776 |
0 |
8 |
|i Druckausg.
|t Applied cryptography and network security
|d Berlin : Springer, 2013
|h XIV, 572 S.
|w (DE-627)747172455
|w (DE-576)394094557
|z 3642389791
|z 9783642389795
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7954
|9 7954
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-38980-1
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38980-1
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz386845794cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20140212094104
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1277.94003
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)751298387
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.32
|j Rechnerkommunikation
|q SEPA
|0 (DE-627)10640623X
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
951 |
|
|
|a BO
|
900 |
|
|
|a Jacobson, Michael
|
900 |
|
|
|a Jacobson, M. J.
|
900 |
|
|
|a Jacobson, M.
|
900 |
|
|
|a Jacobson, Michael J.
|
900 |
|
|
|a Jr.
|
900 |
|
|
|a Naini, Reihaneh Safavi-
|
950 |
|
|
|a Computernetz
|
950 |
|
|
|a Computernetzwerk
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Verbundsystem
|
950 |
|
|
|a Mehrrechnernetz
|
950 |
|
|
|a Vernetzung
|
950 |
|
|
|a Datennetz
|
950 |
|
|
|a Mehrrechnersystem
|
950 |
|
|
|a Verteiltes System
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Kryptographisches System
|
950 |
|
|
|a Verschlüsselungssystem
|
950 |
|
|
|a Chiffriersystem
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Geheimschlüssel
|
950 |
|
|
|a Paarungsbasierte Kryptografie
|
950 |
|
|
|a Geheimcodetechnik
|
950 |
|
|
|a Kryptografie
|
950 |
|
|
|a Kryptographie
|
950 |
|
|
|a Datenverschlüsselung
|
950 |
|
|
|a Steganographie
|
950 |
|
|
|a Kryptologe
|
950 |
|
|
|a 保密学
|
950 |
|
|
|a 密码学
|
950 |
|
|
|a 保密學
|
950 |
|
|
|a 密碼學
|
950 |
|
|
|a Криптология
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
951 |
|
|
|b XD-CA
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38980-1
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3360517369
|z 2013-07-05T09:11:47Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38980-1
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3360517393
|z 2013-07-05T09:11:47Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38980-1
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3360517431
|z 2013-07-05T09:11:47Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38980-1
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3360517466
|z 2013-07-05T09:11:47Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-38980-1
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3360517490
|z 2013-07-05T09:11:47Z
|
980 |
|
|
|a 1652501789
|b 0
|k 1652501789
|o 386845794
|
SOLR
_version_ |
1792258613188755456 |
access_facet |
Electronic Resources |
author |
Jacobson, Michael J. |
author2 |
Locasto, Michael, Mohassel, Payman, Safavi-Naini, Reihaneh |
author2_role |
edt, edt, edt |
author2_variant |
m l ml, p m pm, r s n rsn |
author_facet |
Jacobson, Michael J., Locasto, Michael, Mohassel, Payman, Safavi-Naini, Reihaneh |
author_role |
aut |
author_sort |
Jacobson, Michael J. 1971- |
author_variant |
m j j mj mjj |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems |
ctrlnum |
(DE-627)1652501789, (DE-576)386845794, (DE-599)BSZ386845794, (OCoLC)855544164, (ZBM)1277.94003, (DE-He213)978-3-642-38980-1, (EBP)040549046 |
de15_date |
2013-07-05T09:11:47Z |
dech1_date |
2013-07-05T09:11:47Z |
doi_str_mv |
10.1007/978-3-642-38980-1 |
era_facet |
2013 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2013 Banff, Alberta (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
Canada |
geographic_facet |
Banff, Alberta |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7954 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1652501789 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1652501789 |
is_hierarchy_title |
Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings |
isbn |
9783642389801 |
isbn_isn_mv |
9783642389795, 3642389791 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1652501789 |
language |
English |
last_indexed |
2024-02-29T18:23:25.127Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
marc024a_ct_mv |
10.1007/978-3-642-38980-1 |
match_str |
jacobson2013appliedcryptographyandnetworksecurity11thinternationalconferenceacns2013banffabcanadajune25282013proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7954 |
names_id_str_mv |
(DE-588)121455610, (DE-627)081319576, (DE-576)292720882, (DE-627)1325191841, (DE-576)255191847 |
oclc_num |
855544164 |
physical |
Online-Ressource (XIV, 572 p. 115 illus, online resource) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
386845794 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3231583 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7954 |
series2 |
Lecture Notes in Computer Science ; 7954, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Jacobson, Michael J. 1971- (DE-588)121455610 (DE-627)081319576 (DE-576)292720882 aut, Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini, Berlin, Heidelberg Springer 2013, Online-Ressource (XIV, 572 p. 115 illus, online resource), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7954, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems, Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2013 Banff, Alberta (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, DE-101, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, Locasto, Michael Hrsg. edt, Mohassel, Payman Hrsg. edt, Safavi-Naini, Reihaneh Hrsg. (DE-627)1325191841 (DE-576)255191847 edt, 9783642389795, Druckausg. Applied cryptography and network security Berlin : Springer, 2013 XIV, 572 S. (DE-627)747172455 (DE-576)394094557 3642389791 9783642389795, Lecture notes in computer science 7954 7954 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-38980-1 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-38980-1 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz386845794cov.jpg V:DE-576 X:springer image/jpeg 20140212094104 Cover, https://zbmath.org/?q=an:1277.94003 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)751298387, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-14, DE-14 epn:3360517369 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-15, DE-15 epn:3360517393 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-Ch1, DE-Ch1 epn:3360517431 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3360517466 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-520, DE-520 epn:3360517490 2013-07-05T09:11:47Z |
spellingShingle |
Jacobson, Michael J., Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings, Lecture notes in computer science, 7954, This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems, Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2013 Banff, Alberta, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
swb_id_str |
386845794 |
title |
Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings |
title_auth |
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings |
title_full |
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini |
title_fullStr |
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini |
title_full_unstemmed |
Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini |
title_in_hierarchy |
7954. Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (2013) |
title_short |
Applied Cryptography and Network Security |
title_sort |
applied cryptography and network security 11th international conference acns 2013 banff ab canada june 25 28 2013 proceedings |
title_sub |
11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings |
title_unstemmed |
Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings |
topic |
Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2013 Banff, Alberta, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
topic_facet |
Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse |
url |
https://doi.org/10.1007/978-3-642-38980-1, http://dx.doi.org/10.1007/978-3-642-38980-1, https://swbplus.bsz-bw.de/bsz386845794cov.jpg, https://zbmath.org/?q=an:1277.94003 |