Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2012
Schriftenreihe:Lecture notes in computer science 7372
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV040285079
003 DE-604
005 20120711
007 t
008 120702s2012 gw d||| |||| 10||| eng d
015 |a 12,N24  |2 dnb 
016 7 |a 1023016257  |2 DE-101 
020 |a 3642314473  |9 3-642-31447-3 
020 |a 9783642314476  |c Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)  |9 978-3-642-31447-6 
024 3 |a 9783642314476 
028 5 2 |a Best.-Nr.: 86123269 
035 |a (OCoLC)802523674 
035 |a (DE-599)DNB1023016257 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c XA-DE-BE 
049 |a DE-706  |a DE-83  |a DE-91G  |a DE-11 
082 0 |a 005.82  |2 22/ger 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a 004  |2 sdnb 
245 1 0 |a Information security and privacy  |b 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings  |c Willy Susilo ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2012 
300 |a XIV, 460 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 7372 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Public-Key-Kryptosystem  |0 (DE-588)4209133-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Hash-Algorithmus  |0 (DE-588)4323071-4  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2012  |z Wollongong  |2 gnd-content 
689 0 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 0 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 0 2 |a Hash-Algorithmus  |0 (DE-588)4323071-4  |D s 
689 0 3 |a Public-Key-Kryptosystem  |0 (DE-588)4209133-0  |D s 
689 0 4 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 1 |5 DE-604 
700 1 |a Susilo, Willy  |e Sonstige  |4 oth 
711 2 |a ACISP  |n 17  |d 2012  |c Wollongong  |j Sonstige  |0 (DE-588)1023843218  |4 oth 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-642-31448-3 
830 0 |a Lecture notes in computer science  |v 7372  |w (DE-604)BV000000607  |9 7372 
856 4 2 |m X:MVB  |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=4052398&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025140372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-025140372 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102/DAT 001z 2001 A 999-7372
DE-BY-TUM_katkey 1866054
DE-BY-TUM_media_number 040071418487
_version_ 1816713787805270016
adam_text IMAGE 1 TABLE O F CONTENTS FUNDAMENTALS OPTIMAL BOUNDS FOR MULTI-PRIME ^-HIDING ASSUMPTION 1 KAORI TOSU AND NOBORU KUNIHIRO SUFFICIENT CONDITION FOR EPHEMERAL KEY-LEAKAGE RESILIENT TRIPARTITE KEY EXCHANGE 15 ATSUSHI FUJIOKA, MARK MANULIS, KOUTAROU SUZUKI, AND BERKANT USTAOGLU A GAME-THEORETIC PERSPECTIVE ON OBLIVIOUS TRANSFER 29 HARUNA HIGO, KEISUKE TANAKA, AKIHIRO YAMADA, AND KENJI YASUNAGA FASTER ALGORITHM FOR SOLVING HARD KNAPSACKS FOR MODERATE MESSAGE LENGTH 43 YUJI NAGASHIMA AND NOBORU KUNIHIRO ACCELERATING THE SECURE DISTRIBUTED COMPUTATION OF THE MEAN BY A CHEBYSHEV EXPANSION 57 PETER LORY AND MANUEL LIEDEL C R Y P T A N A L Y S I S SECURITY ANALYSIS OF THE LIGHTWEIGHT BLOCK CIPHERS XTEA, LED AND PICCOLO 71 TAKANORI ISOBE AND KYOJI SHIBUTANI IMPROVED KNOWN-KEY DISTINGUISHES ON FEISTEL-SP CIPHERS AND APPLICATION TO CAMELLIA 87 YU SASAKI, SAREH EMAMI, DEUKJO HONG, AND ASHISH K U M A R LOW DATA COMPLEXITY ATTACK ON REDUCED CAMELLIA-256 101 JIAZHE CHEN AND LEIBO L I CRYPTANALYSIS OF RSA WITH A SMALL PARAMETER 115 XIANMENG MENG AND XUEXIN ZHENG AN ALGEBRAIC BROADCAST ATTACK AGAINST NTRU 124 JINTAI DING, YANBIN PAN, AND YINGPU DENG HTTP://D-NB.INFO/1023016257 IMAGE 2 XII TABLE OF CONTENTS M E S S A G E A U T H E N T I C A T I O N C O D E S A N D H A S H F U N C T I O N S ANALYSIS OF INDIRECT MESSAGE INJECTION FOR MAC GENERATION USING STREAM CIPHERS 138 MUFEED ALMASHRAFI, HARRY BARTLETT, LEONIE SIMPSON, E D DAWSON, AND KENNETH KOON-HO WONG W E I M A R - D M : A HIGHLY SECURE DOUBLE-LENGTH COMPRESSION FUNCTION 152 EWAN FLEISCHMANN, CHRISTIAN FORLER, STEFAN LUCKS, AND JAKOB WENZEL P U B L I C K E Y C R Y P T O G R A P H Y AN EFFICIENT IND-CCA2 SECURE VARIANT OF THE NIEDERREITER ENCRYPTION SCHEME IN THE STANDARD MODEL 166 PREETHA MATHEW K., SACHIN VASANT, SRIDHAR VENKATESAN. AND C. PANDU RANGAN ZERO-KNOWLEDGE PROTOCOLS FOR THE MCELIECE ENCRYPTION 180 KIRILL MOROZOV AND TSUYOSHI TAKAGI EFFORT-RELEASE PUBLIC-KEY ENCRYPTION FROM CRYPTOGRAPHIC PUZZLES 194 JOTHI RANGASAMY, DOUGLAS STEBILA, COLIN BOYD, JUAN MANUEL GONZALEZ-NIETO, AND LAKSHMI KUPPUSAMY LEAKAGE-RESILIENCE OF STATELESS/STATEFUL PUBLIC-KEY ENCRYPTION FROM HASH PROOFS 208 MANH HA NGUYEN, KEISUKE TANAKA, AND KENJI YASUNAGA HOW TO FIX TWO RSA-BASED PVSS SCHEMES-EXPLORATION AND SOLUTION 223 K U N PENG AND MATT HENRICKSEN D I G I T A L S I G N A T U R E S RELATION BETWEEN VERIFIABLE RANDOM FUNCTIONS AND CONVERTIBLE UNDENIABLE SIGNATURES, AND NEW CONSTRUCTIONS 235 KAORU KUROSAWA, RYO NOJIMA, AND LE TRIEU PHONG GENERALIZED FIRST PRE-IMAGE TRACTABLE RANDOM ORACLE MODEL AND SIGNATURE SCHEMES 247 XIAO TAN AND DUNCAN S. WONG IMAGE 3 TABLE OF CONTENTS XIII A SHORT NON-DELEGATABLE STRONG DESIGNATED VERIFIER SIGNATURE 261 HAIBO TIAN, XIAOFENG CHEN, AND JIN L I DETERMINISTIC IDENTITY BASED SIGNATURE SCHEME AND ITS APPLICATION FOR AGGREGATE SIGNATURES 280 S. SHARMILA DEVA SELVI, S. SREE VIVEK, AND C. PANDU RANGAN FULLY LEAKAGE-RESILIENT SIGNATURES WITH AUXILIARY INPUTS 294 TSZ HON YUEN, SIU MING YIU, AND LUCAS C.K. HUI I D E N T I T Y - B A S E D A N D A T T R I B U T E - B A S E D C R Y P T O G R A P H Y ADAPTIVE CCA BROADCAST ENCRYPTION WITH CONSTANT-SIZE SECRET KEYS AND CIPHERTEXTS DUONG-HIEU PHAN, DAVID POINTCHEVAL, SIAMAK F. SHAHANDASHTI, AND MARIO STREFLER A GENERIC CONSTRUCTION OF ACCOUNTABLE DECRYPTION AND ITS APPLICATIONS XUHUA ZHOU, XUHUA DING, AND KEFEI CHEN THRESHOLD CIPHERTEXT POLICY ATTRIBUTE-BASED ENCRYPTION WITH CONSTANT SIZE CIPHERTEXTS AIJUN GE, R U I ZHANG, CHENG CHEN, CHUANGUI MA, AND ZHENFENG ZHANG FULLY PRIVATE REVOCABLE PREDICATE ENCRYPTION JUAN MANUEL GONZALEZ-NIETO, MARK MANULIS, AND DONGDONG S U N ANONYMOUS ID-BASED PROXY RE-ENCRYPTION JUN SHAO L A T T I C E - B A S E D C R Y P T O G R A P H Y ON THE OPTIMALITY OF LATTICES FOR THE COPPERSMITH TECHNIQUE 376 YOSHINORI AONO, MANINDRA AGRAWAL, TAKAKAZU SATOH, AND OSAMU WATANABE REVOCABLE IDENTITY-BASED ENCRYPTION FROM LATTICES 390 JIE CHEN, HOON WEI LIM, SAN LING, HUAXIONG WANG, AND KHOA NGUYEN 308 322 336 350 364 IMAGE 4 XIV TABLE OF CONTENTS L I G H T W E I G H T C R Y P T O G R A P H Y ON AREA, TIME, AND THE RIGHT TRADE-OFF 404 A. POSCHMANN AND M.J.B. ROBSHAW S H O R T P A P E R S ANALYSIS OF XORROTATION WITH APPLICATION TO AN HC-128 VARIANT 419 PAUL STANKOVSKI, MARTIN HELL, AND THOMAS JOHANSSON PRIVATE FINGERPRINT MATCHING 426 SIAMAK F. SHAHANDASHTI, REIHANEH SAFAVI-NAINI, AND PHILIP OGUNBONA MINIMIZING INFORMATION LEAKAGE OF TREE-BASED RFID AUTHENTICATION PROTOCOLS USING ALTERNATE TREE-WALKING 434 KALEB LEE, COLIN BOYD, AND JUAN MANUEL GONZALEZ-NIETO ICAF: A CONTEXT-AWARE FRAMEWORK FOR ACCESS CONTROL 442 A.S.M. KAYES, JUN HAN, AND ALAN COLMAN NON-MALLEABLE INSTANCE-DEPENDENT COMMITMENT IN THE STANDARD MODEL 450 WENPAN JING, HAIXIA XU, AND BAO LI AUTHOR INDEX 459
any_adam_object 1
building Verbundindex
bvnumber BV040285079
classification_rvk SS 4800
ctrlnum (OCoLC)802523674
(DE-599)DNB1023016257
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040285079</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120711</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120702s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N24</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1023016257</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642314473</subfield><subfield code="9">3-642-31447-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642314476</subfield><subfield code="c">Pb. : ca. EUR 66.34 (DE) (freier Pr.), ca. EUR 68.20 (AT) (freier Pr.), ca. sfr 83.00 (freier Pr.)</subfield><subfield code="9">978-3-642-31447-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642314476</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86123269</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)802523674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1023016257</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and privacy</subfield><subfield code="b">17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings</subfield><subfield code="c">Willy Susilo ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 460 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7372</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Wollongong</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Susilo, Willy</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ACISP</subfield><subfield code="n">17</subfield><subfield code="d">2012</subfield><subfield code="c">Wollongong</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1023843218</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-31448-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7372</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7372</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4052398&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=025140372&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025140372</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2012 Wollongong gnd-content
genre_facet Konferenzschrift 2012 Wollongong
id DE-604.BV040285079
illustrated Illustrated
indexdate 2024-11-25T17:37:10Z
institution BVB
institution_GND (DE-588)1023843218
isbn 3642314473
9783642314476
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-025140372
oclc_num 802523674
open_access_boolean
owner DE-706
DE-83
DE-91G
DE-BY-TUM
DE-11
owner_facet DE-706
DE-83
DE-91G
DE-BY-TUM
DE-11
physical XIV, 460 S. graph. Darst.
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings
Lecture notes in computer science
Authentifikation (DE-588)4330656-1 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptologie (DE-588)4033329-2 gnd
Elektronische Unterschrift (DE-588)4269037-7 gnd
Public-Key-Kryptosystem (DE-588)4209133-0 gnd
Hash-Algorithmus (DE-588)4323071-4 gnd
subject_GND (DE-588)4330656-1
(DE-588)4830502-9
(DE-588)4033329-2
(DE-588)4269037-7
(DE-588)4209133-0
(DE-588)4323071-4
(DE-588)1071861417
title Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings
title_auth Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings
title_exact_search Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings
title_full Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Willy Susilo ... (eds.)
title_fullStr Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Willy Susilo ... (eds.)
title_full_unstemmed Information security and privacy 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings Willy Susilo ... (eds.)
title_short Information security and privacy
title_sort information security and privacy 17th australasian conference acisp 2012 wollongong nsw australia july 9 11 2012 proceedings
title_sub 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9 - 11, 2012 ; proceedings
topic Authentifikation (DE-588)4330656-1 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptologie (DE-588)4033329-2 gnd
Elektronische Unterschrift (DE-588)4269037-7 gnd
Public-Key-Kryptosystem (DE-588)4209133-0 gnd
Hash-Algorithmus (DE-588)4323071-4 gnd
topic_facet Authentifikation
Kryptoanalyse
Kryptologie
Elektronische Unterschrift
Public-Key-Kryptosystem
Hash-Algorithmus
Konferenzschrift 2012 Wollongong
url http://deposit.dnb.de/cgi-bin/dokserv?id=4052398&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025140372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT susilowilly informationsecurityandprivacy17thaustralasianconferenceacisp2012wollongongnswaustraliajuly9112012proceedings
AT acispwollongong informationsecurityandprivacy17thaustralasianconferenceacisp2012wollongongnswaustraliajuly9112012proceedings