Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
[2014]
|
Schriftenreihe: | Lecture notes in computer science
8604 : Security and cryptology |
Schlagworte: | |
Online-Zugang: | DE-634 DE-Aug4 DE-M347 DE-92 DE-859 DE-91 DE-384 DE-473 DE-19 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext Inhaltsverzeichnis Abstract |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV042038399 | ||
003 | DE-604 | ||
005 | 20240229 | ||
007 | cr|uuu---uuuuu | ||
008 | 140822s2014 xx a||| o|||| 00||| eng d | ||
020 | |a 9783319100821 |c online |9 978-3-319-10082-1 | ||
024 | 7 | |a 10.1007/978-3-319-10082-1 |2 doi | |
035 | |a (OCoLC)890023889 | ||
035 | |a (DE-599)BVBBV042038399 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-19 |a DE-29 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-634 | ||
082 | 0 | |a 004 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 465 |2 stub | ||
084 | |a DAT 050 |2 stub | ||
245 | 1 | 0 | |a Foundations of security analysis and design VII |b FOSAD 2012/2013 tutorial lectures |c Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c [2014] | |
300 | |a 1 Online-Ressource |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8604 |a Security and cryptology | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Aldini, Alessandro |0 (DE-588)1228377820 |4 edt | |
700 | 1 | |a Lopez, Javier |4 edt | |
700 | 1 | |a Martinelli, Fabio |d 1969- |0 (DE-588)121504691X |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-10081-4 |
830 | 0 | |a Lecture notes in computer science |v 8604 : Security and cryptology |w (DE-604)BV014880109 |9 8604 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-10082-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-LNC_201 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027479699 | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2014 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-10082-1 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2022445 |
---|---|
_version_ | 1820808982895263744 |
adam_text | FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII
/
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
MODEL-BASED TESTING FOR FUNCTIONAL AND SECURITY TEST GENERATION
MODEL-BASED SECURITY ENGINEERING: MANAGED CO-EVOLUTION OF SECURITY
KNOWLEDGE AND SOFTWARE MODELS.-AUTOMATIC VERIFICATION OF SECURITY
PROTOCOLS IN THE SYMBOLIC MODEL: THE VERIFIER PROVERIF.-DEFENSIVE
JAVASCRIPT: BUILDING AND VERIFYING SECURE WEB COMPONENTS.-INFORMATION
FLOW CONTROL FOR WEB SCRIPTS
EASYCRYPT: A TUTORIAL.-CRYPTOGRAPHIC VOTING — A GENTLE
INTRODUCTION.-ENCRYPTION AND FRAGMENTATION FOR DATA CONFIDENTIALITY IN
THE CLOUD.-LOCATION PRIVACY IN WSNS: SOLUTIONS, CHALLENGES, AND FUTURE
TRENDS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII
/
: 2014
ABSTRACT / INHALTSTEXT
FOSAD HAS BEEN ONE OF THE FOREMOST EDUCATIONAL EVENTS ESTABLISHED WITH
THE GOAL OF DISSEMINATING KNOWLEDGE IN THE CRITICAL AREA OF SECURITY IN
COMPUTER SYSTEMS AND NETWORKS. OVER THE YEARS, BOTH THE SUMMER SCHOOL
AND THE BOOK SERIES HAVE REPRESENTED A REFERENCE POINT FOR GRADUATE
STUDENTS AND YOUNG RESEARCHERS FROM ACADEMIA OR INDUSTRY, INTERESTED TO
APPROACH THE FIELD, INVESTIGATE OPEN PROBLEMS, AND FOLLOW PRIORITY LINES
OF RESEARCH. THIS BOOK PRESENTS THOROUGHLY REVISED VERSIONS OF NINE
TUTORIAL LECTURES GIVEN BY LEADING RESEARCHERS DURING THREE
INTERNATIONAL SCHOOLS ON FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN,
FOSAD, HELD IN BERTINORO, ITALY, IN SEPTEMBER 2012 AND 2013. THE TOPICS
COVERED IN THIS BOOK INCLUDE MODEL-BASED SECURITY, AUTOMATIC
VERIFICATION OF SECURE APPLICATIONS, INFORMATION FLOW ANALYSIS,
CRYPTOGRAPHIC VOTING SYSTEMS, ENCRYPTION IN THE CLOUD, AND PRIVACY
PRESERVATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author2 | Aldini, Alessandro Lopez, Javier Martinelli, Fabio 1969- |
author2_role | edt edt edt |
author2_variant | a a aa j l jl f m fm |
author_GND | (DE-588)1228377820 (DE-588)121504691X |
author_facet | Aldini, Alessandro Lopez, Javier Martinelli, Fabio 1969- |
building | Verbundindex |
bvnumber | BV042038399 |
classification_rvk | SS 4800 |
classification_tum | DAT 465 DAT 050 |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)890023889 (DE-599)BVBBV042038399 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-10082-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04021nam a2200721 cb4500</leader><controlfield tag="001">BV042038399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240229 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140822s2014 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319100821</subfield><subfield code="c">online</subfield><subfield code="9">978-3-319-10082-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-10082-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)890023889</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042038399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Foundations of security analysis and design VII</subfield><subfield code="b">FOSAD 2012/2013 tutorial lectures</subfield><subfield code="c">Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8604</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aldini, Alessandro</subfield><subfield code="0">(DE-588)1228377820</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lopez, Javier</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martinelli, Fabio</subfield><subfield code="d">1969-</subfield><subfield code="0">(DE-588)121504691X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-10081-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8604 : Security and cryptology</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_201</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027479699</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2014</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-10082-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV042038399 |
illustrated | Illustrated |
indexdate | 2024-12-24T04:12:09Z |
institution | BVB |
isbn | 9783319100821 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027479699 |
oclc_num | 890023889 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-19 DE-BY-UBM DE-29 DE-92 DE-Aug4 DE-859 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-19 DE-BY-UBM DE-29 DE-92 DE-Aug4 DE-859 DE-634 |
physical | 1 Online-Ressource Illustrationen, Diagramme |
psigel | ZDB-2-LNC ZDB-2-LNC_201 ZDB-2-LNC ZDB-2-LNC_2014 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science Security and cryptology |
spellingShingle | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Lecture notes in computer science Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4209132-9 (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)4143413-4 |
title | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures |
title_auth | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures |
title_exact_search | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures |
title_full | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
title_fullStr | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
title_full_unstemmed | Foundations of security analysis and design VII FOSAD 2012/2013 tutorial lectures Alessandro Aldini, Javier Lopez, Fabio Martinelli (eds.) |
title_short | Foundations of security analysis and design VII |
title_sort | foundations of security analysis and design vii fosad 2012 2013 tutorial lectures |
title_sub | FOSAD 2012/2013 tutorial lectures |
topic | Computersicherheit (DE-588)4274324-2 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computersicherheit Kryptosystem Datensicherung Kryptologie Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-319-10082-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027479699&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT aldinialessandro foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures AT lopezjavier foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures AT martinellifabio foundationsofsecurityanalysisanddesignviifosad20122013tutoriallectures |