Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7372 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040285079 | ||
003 | DE-604 | ||
005 | 20120711 | ||
007 | t | ||
008 | 120702s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N24 |2 dnb | ||
016 | 7 | |a 1023016257 |2 DE-101 | |
020 | |a 3642314473 |9 3-642-31447-3 | ||
020 | |a 9783642314476 |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.) |9 978-3-642-31447-6 | ||
024 | 3 | |a 9783642314476 | |
028 | 5 | 2 | |a Best.-Nr.: 86123269 |
035 | |a (OCoLC)802523674 | ||
035 | |a (DE-599)DNB1023016257 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-91G |a DE-11 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Information security and privacy |b 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings |c Willy Susilo ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XIV, 460 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7372 | |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Wollongong |2 gnd-content | |
689 | 0 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 2 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 0 | 3 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | 4 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Susilo, Willy |e Sonstige |4 oth | |
711 | 2 | |a ACISP |n 17 |d 2012 |c Wollongong |j Sonstige |0 (DE-588)1023843218 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-31448-3 |
830 | 0 | |a Lecture notes in computer science |v 7372 |w (DE-604)BV000000607 |9 7372 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4052398&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025140372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025140372 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102/DAT 001z 2001 A 999-7372 |
---|---|
DE-BY-TUM_katkey | 1866054 |
DE-BY-TUM_media_number | 040071418487 |
_version_ | 1816713787805270016 |
adam_text |
IMAGE 1
TABLE O F CONTENTS
FUNDAMENTALS
OPTIMAL BOUNDS FOR MULTI-PRIME ^-HIDING ASSUMPTION 1
KAORI TOSU AND NOBORU KUNIHIRO
SUFFICIENT CONDITION FOR EPHEMERAL KEY-LEAKAGE RESILIENT TRIPARTITE KEY
EXCHANGE 15
ATSUSHI FUJIOKA, MARK MANULIS, KOUTAROU SUZUKI, AND BERKANT USTAOGLU
A GAME-THEORETIC PERSPECTIVE ON OBLIVIOUS TRANSFER 29
HARUNA HIGO, KEISUKE TANAKA, AKIHIRO YAMADA, AND KENJI YASUNAGA
FASTER ALGORITHM FOR SOLVING HARD KNAPSACKS FOR MODERATE MESSAGE LENGTH
43
YUJI NAGASHIMA AND NOBORU KUNIHIRO
ACCELERATING THE SECURE DISTRIBUTED COMPUTATION OF THE MEAN BY A
CHEBYSHEV EXPANSION 57
PETER LORY AND MANUEL LIEDEL
C R Y P T A N A L Y S I S
SECURITY ANALYSIS OF THE LIGHTWEIGHT BLOCK CIPHERS XTEA, LED AND PICCOLO
71
TAKANORI ISOBE AND KYOJI SHIBUTANI
IMPROVED KNOWN-KEY DISTINGUISHES ON FEISTEL-SP CIPHERS AND APPLICATION
TO CAMELLIA 87
YU SASAKI, SAREH EMAMI, DEUKJO HONG, AND ASHISH K U M A R
LOW DATA COMPLEXITY ATTACK ON REDUCED CAMELLIA-256 101
JIAZHE CHEN AND LEIBO L I
CRYPTANALYSIS OF RSA WITH A SMALL PARAMETER 115
XIANMENG MENG AND XUEXIN ZHENG
AN ALGEBRAIC BROADCAST ATTACK AGAINST NTRU 124
JINTAI DING, YANBIN PAN, AND YINGPU DENG
HTTP://D-NB.INFO/1023016257
IMAGE 2
XII TABLE OF CONTENTS
M E S S A G E A U T H E N T I C A T I O N C O D E S A N D H A S H F U N
C T I O N S
ANALYSIS OF INDIRECT MESSAGE INJECTION FOR MAC GENERATION USING STREAM
CIPHERS 138
MUFEED ALMASHRAFI, HARRY BARTLETT, LEONIE SIMPSON, E D DAWSON, AND
KENNETH KOON-HO WONG
W E I M A R - D M : A HIGHLY SECURE DOUBLE-LENGTH COMPRESSION FUNCTION
152
EWAN FLEISCHMANN, CHRISTIAN FORLER, STEFAN LUCKS, AND JAKOB WENZEL
P U B L I C K E Y C R Y P T O G R A P H Y
AN EFFICIENT IND-CCA2 SECURE VARIANT OF THE NIEDERREITER ENCRYPTION
SCHEME IN THE STANDARD MODEL 166
PREETHA MATHEW K., SACHIN VASANT, SRIDHAR VENKATESAN. AND C. PANDU
RANGAN
ZERO-KNOWLEDGE PROTOCOLS FOR THE MCELIECE ENCRYPTION 180
KIRILL MOROZOV AND TSUYOSHI TAKAGI
EFFORT-RELEASE PUBLIC-KEY ENCRYPTION FROM CRYPTOGRAPHIC PUZZLES 194
JOTHI RANGASAMY, DOUGLAS STEBILA, COLIN BOYD, JUAN MANUEL
GONZALEZ-NIETO, AND LAKSHMI KUPPUSAMY
LEAKAGE-RESILIENCE OF STATELESS/STATEFUL PUBLIC-KEY ENCRYPTION FROM HASH
PROOFS 208
MANH HA NGUYEN, KEISUKE TANAKA, AND KENJI YASUNAGA
HOW TO FIX TWO RSA-BASED PVSS SCHEMES-EXPLORATION AND SOLUTION 223
K U N PENG AND MATT HENRICKSEN
D I G I T A L S I G N A T U R E S
RELATION BETWEEN VERIFIABLE RANDOM FUNCTIONS AND CONVERTIBLE UNDENIABLE
SIGNATURES, AND NEW CONSTRUCTIONS 235
KAORU KUROSAWA, RYO NOJIMA, AND LE TRIEU PHONG
GENERALIZED FIRST PRE-IMAGE TRACTABLE RANDOM ORACLE MODEL AND SIGNATURE
SCHEMES 247
XIAO TAN AND DUNCAN S. WONG
IMAGE 3
TABLE OF CONTENTS XIII
A SHORT NON-DELEGATABLE STRONG DESIGNATED VERIFIER SIGNATURE 261 HAIBO
TIAN, XIAOFENG CHEN, AND JIN L I
DETERMINISTIC IDENTITY BASED SIGNATURE SCHEME AND ITS APPLICATION FOR
AGGREGATE SIGNATURES 280
S. SHARMILA DEVA SELVI, S. SREE VIVEK, AND C. PANDU RANGAN
FULLY LEAKAGE-RESILIENT SIGNATURES WITH AUXILIARY INPUTS 294
TSZ HON YUEN, SIU MING YIU, AND LUCAS C.K. HUI
I D E N T I T Y - B A S E D A N D A T T R I B U T E - B A S E D C R Y P
T O G R A P H Y
ADAPTIVE CCA BROADCAST ENCRYPTION WITH CONSTANT-SIZE SECRET KEYS AND
CIPHERTEXTS DUONG-HIEU PHAN, DAVID POINTCHEVAL, SIAMAK F. SHAHANDASHTI,
AND MARIO STREFLER
A GENERIC CONSTRUCTION OF ACCOUNTABLE DECRYPTION AND ITS APPLICATIONS
XUHUA ZHOU, XUHUA DING, AND KEFEI CHEN
THRESHOLD CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION WITH CONSTANT
SIZE CIPHERTEXTS AIJUN GE, R U I ZHANG, CHENG CHEN, CHUANGUI MA, AND
ZHENFENG ZHANG
FULLY PRIVATE REVOCABLE PREDICATE ENCRYPTION JUAN MANUEL GONZALEZ-NIETO,
MARK MANULIS, AND DONGDONG S U N
ANONYMOUS ID-BASED PROXY RE-ENCRYPTION JUN SHAO
L A T T I C E - B A S E D C R Y P T O G R A P H Y
ON THE OPTIMALITY OF LATTICES FOR THE COPPERSMITH TECHNIQUE 376
YOSHINORI AONO, MANINDRA AGRAWAL, TAKAKAZU SATOH, AND OSAMU WATANABE
REVOCABLE IDENTITY-BASED ENCRYPTION FROM LATTICES 390
JIE CHEN, HOON WEI LIM, SAN LING, HUAXIONG WANG, AND KHOA NGUYEN
308
322
336
350
364
IMAGE 4
XIV TABLE OF CONTENTS
L I G H T W E I G H T C R Y P T O G R A P H Y
ON AREA, TIME, AND THE RIGHT TRADE-OFF 404
A. POSCHMANN AND M.J.B. ROBSHAW
S H O R T P A P E R S
ANALYSIS OF XORROTATION WITH APPLICATION TO AN HC-128 VARIANT 419 PAUL
STANKOVSKI, MARTIN HELL, AND THOMAS JOHANSSON
PRIVATE FINGERPRINT MATCHING 426
SIAMAK F. SHAHANDASHTI, REIHANEH SAFAVI-NAINI, AND PHILIP OGUNBONA
MINIMIZING INFORMATION LEAKAGE OF TREE-BASED RFID AUTHENTICATION
PROTOCOLS USING ALTERNATE TREE-WALKING 434
KALEB LEE, COLIN BOYD, AND JUAN MANUEL GONZALEZ-NIETO
ICAF: A CONTEXT-AWARE FRAMEWORK FOR ACCESS CONTROL 442
A.S.M. KAYES, JUN HAN, AND ALAN COLMAN
NON-MALLEABLE INSTANCE-DEPENDENT COMMITMENT IN THE STANDARD MODEL 450
WENPAN JING, HAIXIA XU, AND BAO LI
AUTHOR INDEX 459 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040285079 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)802523674 (DE-599)DNB1023016257 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040285079</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120711</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120702s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N24</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1023016257</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642314473</subfield><subfield code="9">3-642-31447-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642314476</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-31447-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642314476</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86123269</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)802523674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1023016257</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and privacy</subfield><subfield code="b">17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings</subfield><subfield code="c">Willy Susilo ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 460 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7372</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Wollongong</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susilo, Willy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACISP</subfield><subfield code="n">17</subfield><subfield code="d">2012</subfield><subfield code="c">Wollongong</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1023843218</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-31448-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7372</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7372</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4052398&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025140372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025140372</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Wollongong gnd-content |
genre_facet | Konferenzschrift 2012 Wollongong |
id | DE-604.BV040285079 |
illustrated | Illustrated |
indexdate | 2024-11-25T17:37:10Z |
institution | BVB |
institution_GND | (DE-588)1023843218 |
isbn | 3642314473 9783642314476 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025140372 |
oclc_num | 802523674 |
open_access_boolean | |
owner | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-706 DE-83 DE-91G DE-BY-TUM DE-11 |
physical | XIV, 460 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Lecture notes in computer science Authentifikation (DE-588)4330656-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4830502-9 (DE-588)4033329-2 (DE-588)4269037-7 (DE-588)4209133-0 (DE-588)4323071-4 (DE-588)1071861417 |
title | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings |
title_auth | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings |
title_exact_search | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings |
title_full | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Willy Susilo ... (eds.) |
title_fullStr | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Willy Susilo ... (eds.) |
title_full_unstemmed | Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Willy Susilo ... (eds.) |
title_short | Information security and privacy |
title_sort | information security and privacy 17th australasian conference acisp 2012 wollongong nsw australia july 9 11 2012 proceedings |
title_sub | 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings |
topic | Authentifikation (DE-588)4330656-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Kryptologie (DE-588)4033329-2 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd Hash-Algorithmus (DE-588)4323071-4 gnd |
topic_facet | Authentifikation Kryptoanalyse Kryptologie Elektronische Unterschrift Public-Key-Kryptosystem Hash-Algorithmus Konferenzschrift 2012 Wollongong |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4052398&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025140372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT susilowilly informationsecurityandprivacy17thaustralasianconferenceacisp2012wollongongnswaustraliajuly9112012proceedings AT acispwollongong informationsecurityandprivacy17thaustralasianconferenceacisp2012wollongongnswaustraliajuly9112012proceedings |