Eintrag weiter verarbeiten

Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings

Gespeichert in:

Personen und Körperschaften: Jacobson, Michael J. (VerfasserIn), Locasto, Michael (HerausgeberIn), Mohassel, Payman (HerausgeberIn), Safavi-Naini, Reihaneh (HerausgeberIn)
Titel: Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings/ edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2013
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7954
Schlagwörter:
Druckausg.: Applied cryptography and network security, Berlin : Springer, 2013, XIV, 572 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 08203cam a22019452 4500
001 0-1652501789
003 DE-627
005 20240122104923.0
007 cr uuu---uuuuu
008 130705s2013 gw |||||o 00| ||eng c
020 |a 9783642389801  |9 978-3-642-38980-1 
024 7 |a 10.1007/978-3-642-38980-1  |2 doi 
035 |a (DE-627)1652501789 
035 |a (DE-576)386845794 
035 |a (DE-599)BSZ386845794 
035 |a (OCoLC)855544164 
035 |a (ZBM)1277.94003 
035 |a (ZBM)1277.94003 
035 |a (DE-He213)978-3-642-38980-1 
035 |a (EBP)040549046 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.38  |2 bkl 
084 |a 54.32  |2 bkl 
084 |a 54.62  |2 bkl 
100 1 |a Jacobson, Michael J.  |d 1971-  |0 (DE-588)121455610  |0 (DE-627)081319576  |0 (DE-576)292720882  |4 aut 
245 1 0 |a Applied Cryptography and Network Security  |b 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings  |c edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2013 
300 |a Online-Ressource (XIV, 572 p. 115 illus, online resource) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7954 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data structures (Computer science) 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data protection 
650 0 |a Data structures (Computer science) 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Information Systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Electronic data processing 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Information theory. 
650 0 |a Artificial intelligence 
655 7 |a Konferenzschrift  |y 2013  |z Banff, Alberta  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 1 |D s  |0 (DE-588)4209132-9  |0 (DE-627)105106836  |0 (DE-576)210190086  |a Kryptosystem  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4070085-9  |0 (DE-627)104131403  |0 (DE-576)209179252  |a Rechnernetz  |2 gnd 
689 1 1 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 1 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 1 |5 DE-101 
689 2 0 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 2 |5 DE-101 
700 1 |a Locasto, Michael  |e Hrsg.  |4 edt 
700 1 |a Mohassel, Payman  |e Hrsg.  |4 edt 
700 1 |a Safavi-Naini, Reihaneh  |e Hrsg.  |0 (DE-627)1325191841  |0 (DE-576)255191847  |4 edt 
776 1 |z 9783642389795 
776 0 8 |i Druckausg.  |t Applied cryptography and network security  |d Berlin : Springer, 2013  |h XIV, 572 S.  |w (DE-627)747172455  |w (DE-576)394094557  |z 3642389791  |z 9783642389795 
830 0 |a Lecture notes in computer science  |v 7954  |9 7954  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-38980-1  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-38980-1  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz386845794cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20140212094104  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1277.94003  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
889 |w (DE-627)751298387 
912 |a ZDB-2-LNC  |b 2013 
912 |a ZDB-2-SCS  |b 2013 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2013 
912 |a ZDB-2-SEB  |b 2013 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 54.32  |j Rechnerkommunikation  |q SEPA  |0 (DE-627)10640623X 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
951 |a BO 
900 |a Jacobson, Michael 
900 |a Jacobson, M. J. 
900 |a Jacobson, M. 
900 |a Jacobson, Michael J. 
900 |a Jr. 
900 |a Naini, Reihaneh Safavi- 
950 |a Computernetz 
950 |a Computernetzwerk 
950 |a Datenverarbeitung 
950 |a Verbundsystem 
950 |a Mehrrechnernetz 
950 |a Vernetzung 
950 |a Datennetz 
950 |a Mehrrechnersystem 
950 |a Verteiltes System 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Kryptographisches System 
950 |a Verschlüsselungssystem 
950 |a Chiffriersystem 
950 |a Chiffrierung 
950 |a Geheimschlüssel 
950 |a Paarungsbasierte Kryptografie 
950 |a Geheimcodetechnik 
950 |a Kryptografie 
950 |a Kryptographie 
950 |a Datenverschlüsselung 
950 |a Steganographie 
950 |a Kryptologe 
950 |a 保密学 
950 |a 密码学 
950 |a 保密學 
950 |a 密碼學 
950 |a Криптология 
950 |a Datensicherheit 
950 |a Computersicherheit 
950 |a Надёжность сохранения данных 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
951 |b XD-CA 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-38980-1  |9 DE-14 
852 |a DE-14  |x epn:3360517369  |z 2013-07-05T09:11:47Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-38980-1  |9 DE-15 
852 |a DE-15  |x epn:3360517393  |z 2013-07-05T09:11:47Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-38980-1  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3360517431  |z 2013-07-05T09:11:47Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-38980-1  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3360517466  |z 2013-07-05T09:11:47Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-38980-1  |9 DE-520 
852 |a DE-520  |x epn:3360517490  |z 2013-07-05T09:11:47Z 
980 |a 1652501789  |b 0  |k 1652501789  |o 386845794 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Applied+Cryptography+and+Network+Security%3A+11th+International+Conference%2C+ACNS+2013%2C+Banff%2C+AB%2C+Canada%2C+June+25-28%2C+2013.+Proceedings&rft.date=2013&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Applied+Cryptography+and+Network+Security%3A+11th+International+Conference%2C+ACNS+2013%2C+Banff%2C+AB%2C+Canada%2C+June+25-28%2C+2013.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+7954&rft.au=Jacobson%2C+Michael+J.&rft.pub=Springer&rft.edition=&rft.isbn=3642389805
SOLR
_version_ 1792258613188755456
access_facet Electronic Resources
author Jacobson, Michael J.
author2 Locasto, Michael, Mohassel, Payman, Safavi-Naini, Reihaneh
author2_role edt, edt, edt
author2_variant m l ml, p m pm, r s n rsn
author_facet Jacobson, Michael J., Locasto, Michael, Mohassel, Payman, Safavi-Naini, Reihaneh
author_role aut
author_sort Jacobson, Michael J. 1971-
author_variant m j j mj mjj
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems
ctrlnum (DE-627)1652501789, (DE-576)386845794, (DE-599)BSZ386845794, (OCoLC)855544164, (ZBM)1277.94003, (DE-He213)978-3-642-38980-1, (EBP)040549046
de15_date 2013-07-05T09:11:47Z
dech1_date 2013-07-05T09:11:47Z
doi_str_mv 10.1007/978-3-642-38980-1
era_facet 2013
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2013 Banff, Alberta (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person Canada
geographic_facet Banff, Alberta
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7954
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1652501789
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2013
imprint_str_mv Berlin, Heidelberg: Springer, 2013
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1652501789
is_hierarchy_title Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
isbn 9783642389801
isbn_isn_mv 9783642389795, 3642389791
issn_isn_mv 1611-3349
kxp_id_str 1652501789
language English
last_indexed 2024-02-29T18:23:25.127Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
marc024a_ct_mv 10.1007/978-3-642-38980-1
match_str jacobson2013appliedcryptographyandnetworksecurity11thinternationalconferenceacns2013banffabcanadajune25282013proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7954
names_id_str_mv (DE-588)121455610, (DE-627)081319576, (DE-576)292720882, (DE-627)1325191841, (DE-576)255191847
oclc_num 855544164
physical Online-Ressource (XIV, 572 p. 115 illus, online resource)
publishDate 2013
publishDateSort 2013
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 386845794
recordtype marcfinc
rsn_id_str_mv (DE-15)3231583
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7954
series2 Lecture Notes in Computer Science ; 7954, SpringerLink ; Bücher
source_id 0
spelling Jacobson, Michael J. 1971- (DE-588)121455610 (DE-627)081319576 (DE-576)292720882 aut, Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini, Berlin, Heidelberg Springer 2013, Online-Ressource (XIV, 572 p. 115 illus, online resource), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7954, SpringerLink Bücher, Literaturangaben, This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems, Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2013 Banff, Alberta (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, DE-101, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, Locasto, Michael Hrsg. edt, Mohassel, Payman Hrsg. edt, Safavi-Naini, Reihaneh Hrsg. (DE-627)1325191841 (DE-576)255191847 edt, 9783642389795, Druckausg. Applied cryptography and network security Berlin : Springer, 2013 XIV, 572 S. (DE-627)747172455 (DE-576)394094557 3642389791 9783642389795, Lecture notes in computer science 7954 7954 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-38980-1 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-38980-1 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz386845794cov.jpg V:DE-576 X:springer image/jpeg 20140212094104 Cover, https://zbmath.org/?q=an:1277.94003 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)751298387, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-14, DE-14 epn:3360517369 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-15, DE-15 epn:3360517393 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-Ch1, DE-Ch1 epn:3360517431 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3360517466 2013-07-05T09:11:47Z, http://dx.doi.org/10.1007/978-3-642-38980-1 DE-520, DE-520 epn:3360517490 2013-07-05T09:11:47Z
spellingShingle Jacobson, Michael J., Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings, Lecture notes in computer science, 7954, This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems, Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2013 Banff, Alberta, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
swb_id_str 386845794
title Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
title_auth Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
title_full Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
title_fullStr Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
title_full_unstemmed Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings edited by Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
title_in_hierarchy 7954. Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (2013)
title_short Applied Cryptography and Network Security
title_sort applied cryptography and network security 11th international conference acns 2013 banff ab canada june 25 28 2013 proceedings
title_sub 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
title_unstemmed Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings
topic Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift 2013 Banff, Alberta, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
topic_facet Computer science, Computer Communication Networks, Data structures (Computer science), Information Systems, Computer Science, Data protection, Data encryption (Computer science), Coding theory, Electronic data processing, Computer networks ., Cryptography., Information theory., Artificial intelligence, Konferenzschrift, Kryptologie, Kryptosystem, Rechnernetz, Datensicherung, Computersicherheit, Kryptoanalyse
url https://doi.org/10.1007/978-3-642-38980-1, http://dx.doi.org/10.1007/978-3-642-38980-1, https://swbplus.bsz-bw.de/bsz386845794cov.jpg, https://zbmath.org/?q=an:1277.94003