Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Aldini, Alessandro (HerausgeberIn), Lopez, Javier (HerausgeberIn), Martinelli, Fabio 1969- (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Cham [u.a.] Springer [2014]
Schriftenreihe:Lecture notes in computer science 8604 : Security and cryptology
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-M347
DE-92
DE-859
DE-91
DE-384
DE-473
DE-19
DE-703
DE-20
DE-706
DE-29
DE-739
Volltext
Inhaltsverzeichnis
Abstract
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV042038399
003 DE-604
005 20240229
007 cr|uuu---uuuuu
008 140822s2014 xx a||| o|||| 00||| eng d
020 |a 9783319100821  |c online  |9 978-3-319-10082-1 
024 7 |a 10.1007/978-3-319-10082-1  |2 doi 
035 |a (OCoLC)890023889 
035 |a (DE-599)BVBBV042038399 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-473  |a DE-20  |a DE-91  |a DE-706  |a DE-739  |a DE-384  |a DE-M347  |a DE-703  |a DE-19  |a DE-29  |a DE-92  |a DE-Aug4  |a DE-859  |a DE-634 
082 0 |a 004 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 465  |2 stub 
084 |a DAT 050  |2 stub 
245 1 0 |a Foundations of security analysis and design VII  |b FOSAD 2012/2013 tutorial lectures  |c Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) 
264 1 |a Cham [u.a.]  |b Springer  |c [2014] 
300 |a 1 Online-Ressource  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 8604  |a Security and cryptology 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)4143413-4  |a Aufsatzsammlung  |2 gnd-content 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 3 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 0 |5 DE-604 
700 1 |a Aldini, Alessandro  |0 (DE-588)1228377820  |4 edt 
700 1 |a Lopez, Javier  |4 edt 
700 1 |a Martinelli, Fabio  |d 1969-  |0 (DE-588)121504691X  |4 edt 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-3-319-10081-4 
830 0 |a Lecture notes in computer science  |v 8604 : Security and cryptology  |w (DE-604)BV014880109  |9 8604 
856 4 0 |u https://doi.org/10.1007/978-3-319-10082-1  |x Verlag  |3 Volltext 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
856 4 2 |m Springer Fremddatenuebernahme  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA  |3 Abstract 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-LNC_201 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027479699 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2014  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-10082-1  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2022445
_version_ 1820808982895263744
adam_text FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII / : 2014 TABLE OF CONTENTS / INHALTSVERZEICHNIS MODEL-BASED TESTING FOR FUNCTIONAL AND SECURITY TEST GENERATION MODEL-BASED SECURITY ENGINEERING: MANAGED CO-EVOLUTION OF SECURITY KNOWLEDGE AND SOFTWARE MODELS.-AUTOMATIC VERIFICATION OF SECURITY PROTOCOLS IN THE SYMBOLIC MODEL: THE VERIFIER PROVERIF.-DEFENSIVE JAVASCRIPT: BUILDING AND VERIFYING SECURE WEB COMPONENTS.-INFORMATION FLOW CONTROL FOR WEB SCRIPTS EASYCRYPT: A TUTORIAL.-CRYPTOGRAPHIC VOTING — A GENTLE INTRODUCTION.-ENCRYPTION AND FRAGMENTATION FOR DATA CONFIDENTIALITY IN THE CLOUD.-LOCATION PRIVACY IN WSNS: SOLUTIONS, CHALLENGES, AND FUTURE TRENDS DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII / : 2014 ABSTRACT / INHALTSTEXT FOSAD HAS BEEN ONE OF THE FOREMOST EDUCATIONAL EVENTS ESTABLISHED WITH THE GOAL OF DISSEMINATING KNOWLEDGE IN THE CRITICAL AREA OF SECURITY IN COMPUTER SYSTEMS AND NETWORKS. OVER THE YEARS, BOTH THE SUMMER SCHOOL AND THE BOOK SERIES HAVE REPRESENTED A REFERENCE POINT FOR GRADUATE STUDENTS AND YOUNG RESEARCHERS FROM ACADEMIA OR INDUSTRY, INTERESTED TO APPROACH THE FIELD, INVESTIGATE OPEN PROBLEMS, AND FOLLOW PRIORITY LINES OF RESEARCH. THIS BOOK PRESENTS THOROUGHLY REVISED VERSIONS OF NINE TUTORIAL LECTURES GIVEN BY LEADING RESEARCHERS DURING THREE INTERNATIONAL SCHOOLS ON FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN, FOSAD, HELD IN BERTINORO, ITALY, IN SEPTEMBER 2012 AND 2013. THE TOPICS COVERED IN THIS BOOK INCLUDE MODEL-BASED SECURITY, AUTOMATIC VERIFICATION OF SECURE APPLICATIONS, INFORMATION FLOW ANALYSIS, CRYPTOGRAPHIC VOTING SYSTEMS, ENCRYPTION IN THE CLOUD, AND PRIVACY PRESERVATION DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
any_adam_object 1
author2 Aldini, Alessandro
Lopez, Javier
Martinelli, Fabio 1969-
author2_role edt
edt
edt
author2_variant a a aa
j l jl
f m fm
author_GND (DE-588)1228377820
(DE-588)121504691X
author_facet Aldini, Alessandro
Lopez, Javier
Martinelli, Fabio 1969-
building Verbundindex
bvnumber BV042038399
classification_rvk SS 4800
classification_tum DAT 465
DAT 050
collection ZDB-2-LNC
ctrlnum (OCoLC)890023889
(DE-599)BVBBV042038399
dewey-full 004
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004
dewey-search 004
dewey-sort 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-10082-1
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04021nam a2200721 cb4500</leader><controlfield tag="001">BV042038399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240229 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140822s2014 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319100821</subfield><subfield code="c">online</subfield><subfield code="9">978-3-319-10082-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-10082-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890023889</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042038399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of security analysis and design VII</subfield><subfield code="b">FOSAD 2012/2013 tutorial lectures</subfield><subfield code="c">Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8604</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aldini, Alessandro</subfield><subfield code="0">(DE-588)1228377820</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Javier</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martinelli, Fabio</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)121504691X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-10081-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8604 : Security and cryptology</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=027479699&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=027479699&amp;sequence=000003&amp;line_number=0002&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_201</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027479699</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2014</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)4143413-4 Aufsatzsammlung gnd-content
genre_facet Aufsatzsammlung
id DE-604.BV042038399
illustrated Illustrated
indexdate 2024-12-24T04:12:09Z
institution BVB
isbn 9783319100821
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027479699
oclc_num 890023889
open_access_boolean
owner DE-473
DE-BY-UBG
DE-20
DE-91
DE-BY-TUM
DE-706
DE-739
DE-384
DE-M347
DE-703
DE-19
DE-BY-UBM
DE-29
DE-92
DE-Aug4
DE-859
DE-634
owner_facet DE-473
DE-BY-UBG
DE-20
DE-91
DE-BY-TUM
DE-706
DE-739
DE-384
DE-M347
DE-703
DE-19
DE-BY-UBM
DE-29
DE-92
DE-Aug4
DE-859
DE-634
physical 1 Online-Ressource Illustrationen, Diagramme
psigel ZDB-2-LNC
ZDB-2-LNC_201
ZDB-2-LNC ZDB-2-LNC_2014
publishDate 2014
publishDateSearch 2014
publishDateSort 2014
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures
Lecture notes in computer science
Computersicherheit (DE-588)4274324-2 gnd
Kryptosystem (DE-588)4209132-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4274324-2
(DE-588)4209132-9
(DE-588)4011144-1
(DE-588)4033329-2
(DE-588)4143413-4
title Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures
title_auth Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures
title_exact_search Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures
title_full Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.)
title_fullStr Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.)
title_full_unstemmed Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.)
title_short Foundations of security analysis and design VII
title_sort foundations of security analysis and design vii fosad 2012 2013 tutorial lectures
title_sub FOSAD 2012/2013 tutorial lectures
topic Computersicherheit (DE-588)4274324-2 gnd
Kryptosystem (DE-588)4209132-9 gnd
Datensicherung (DE-588)4011144-1 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Computersicherheit
Kryptosystem
Datensicherung
Kryptologie
Aufsatzsammlung
url https://doi.org/10.1007/978-3-319-10082-1
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV014880109
work_keys_str_mv AT aldinialessandro foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures
AT lopezjavier foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures
AT martinellifabio foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures