Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ProvSec Xi'an (VerfasserIn)
Weitere Verfasser: Okamoto, Tatsuaki 1952- (HerausgeberIn)
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Cham Springer [2017]
Schriftenreihe:Lecture notes in computer science 10592
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV044641630
003 DE-604
005 20180702
007 t|
008 171120s2017 xx |||| |||| 10||| eng d
020 |a 9783319686363  |9 978-3-319-68636-3 
035 |a (OCoLC)1012497818 
035 |a (DE-599)BVBBV044641630 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-83 
082 0 |a 005.82  |2 23 
111 2 |a ProvSec  |n 11.  |d 2017  |c Xi'an  |j Verfasser  |0 (DE-588)1144907934  |4 aut 
245 1 0 |a Provable security  |b 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings  |c Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) 
264 1 |a Cham  |b Springer  |c [2017] 
300 |a XIII, 508 Seiten  |b Diagramme 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 10592 
650 4 |a Computer science 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Algorithms 
650 4 |a Application software 
650 4 |a Computers and civilization 
650 4 |a Management information systems 
650 4 |a Computer Science 
650 4 |a Data Encryption 
650 4 |a Systems and Data Security 
650 4 |a Computers and Society 
650 4 |a Computer Appl. in Administrative Data Processing 
650 4 |a Management of Computing and Information Systems 
650 4 |a Algorithm Analysis and Problem Complexity 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Interaktives Beweissystem  |0 (DE-588)4648334-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Schlüsselaustauschprotokoll  |0 (DE-588)1029440018  |2 gnd  |9 rswk-swf 
650 0 7 |a Beweisbarkeit  |0 (DE-588)7578966-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Hash-Algorithmus  |0 (DE-588)4323071-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Chiffrierung  |0 (DE-588)4352893-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 3 |a Chiffrierung  |0 (DE-588)4352893-4  |D s 
689 0 4 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 0 5 |a Schlüsselaustauschprotokoll  |0 (DE-588)1029440018  |D s 
689 0 6 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |D s 
689 0 7 |a Beweisbarkeit  |0 (DE-588)7578966-8  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 1 2 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 3 |a Interaktives Beweissystem  |0 (DE-588)4648334-2  |D s 
689 1 |5 DE-604 
689 2 0 |a Sicherheitsprotokoll  |0 (DE-588)4709127-7  |D s 
689 2 1 |a Interaktives Beweissystem  |0 (DE-588)4648334-2  |D s 
689 2 |5 DE-604 
689 3 0 |a Hash-Algorithmus  |0 (DE-588)4323071-4  |D s 
689 3 |5 DE-604 
689 4 0 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 4 |5 DE-604 
689 5 0 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |D s 
689 5 |5 DE-604 
700 1 |a Okamoto, Tatsuaki  |d 1952-  |0 (DE-588)133090418  |4 edt 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |z 978-3-319-68637-0 
830 0 |a Lecture notes in computer science  |v 10592  |w (DE-604)BV000000607  |9 10592 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030039590 

Datensatz im Suchindex

_version_ 1822409716304707584
adam_text
any_adam_object
author2 Okamoto, Tatsuaki 1952-
author2_role edt
author2_variant t o to
author_GND (DE-588)133090418
author_corporate ProvSec Xi'an
author_corporate_role aut
author_facet Okamoto, Tatsuaki 1952-
ProvSec Xi'an
author_sort ProvSec Xi'an
building Verbundindex
bvnumber BV044641630
classification_rvk SS 4800
ctrlnum (OCoLC)1012497818
(DE-599)BVBBV044641630
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044641630</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180702</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">171120s2017 xx |||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319686363</subfield><subfield code="9">978-3-319-68636-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1012497818</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044641630</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ProvSec</subfield><subfield code="n">11.</subfield><subfield code="d">2017</subfield><subfield code="c">Xi'an</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1144907934</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Provable security</subfield><subfield code="b">11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings</subfield><subfield code="c">Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 508 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10592</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Appl. in Administrative Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Okamoto, Tatsuaki</subfield><subfield code="d">1952-</subfield><subfield code="0">(DE-588)133090418</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-68637-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10592</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10592</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030039590</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV044641630
illustrated Not Illustrated
indexdate 2025-01-27T13:42:19Z
institution BVB
institution_GND (DE-588)1144907934
isbn 9783319686363
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030039590
oclc_num 1012497818
open_access_boolean
owner DE-83
owner_facet DE-83
physical XIII, 508 Seiten Diagramme
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spelling ProvSec 11. 2017 Xi'an Verfasser (DE-588)1144907934 aut
Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.)
Cham Springer [2017]
XIII, 508 Seiten Diagramme
txt rdacontent
n rdamedia
nc rdacarrier
Lecture notes in computer science 10592
Computer science
Computer security
Data encryption (Computer science)
Algorithms
Application software
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf
Kryptosystem (DE-588)4209132-9 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Kryptologie (DE-588)4033329-2 gnd rswk-swf
Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf
Interaktives Beweissystem (DE-588)4648334-2 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Schlüsselaustauschprotokoll (DE-588)1029440018 gnd rswk-swf
Beweisbarkeit (DE-588)7578966-8 gnd rswk-swf
Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf
Chiffrierung (DE-588)4352893-4 gnd rswk-swf
Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift gnd-content
Computersicherheit (DE-588)4274324-2 s
Datensicherung (DE-588)4011144-1 s
Kryptologie (DE-588)4033329-2 s
Chiffrierung (DE-588)4352893-4 s
Kryptosystem (DE-588)4209132-9 s
Schlüsselaustauschprotokoll (DE-588)1029440018 s
Elektronische Unterschrift (DE-588)4269037-7 s
Beweisbarkeit (DE-588)7578966-8 s
DE-604
Kryptoanalyse (DE-588)4830502-9 s
Interaktives Beweissystem (DE-588)4648334-2 s
Sicherheitsprotokoll (DE-588)4709127-7 s
Hash-Algorithmus (DE-588)4323071-4 s
Okamoto, Tatsuaki 1952- (DE-588)133090418 edt
Erscheint auch als Online-Ausgabe 978-3-319-68637-0
Lecture notes in computer science 10592 (DE-604)BV000000607 10592
spellingShingle Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings
Lecture notes in computer science
Computer science
Computer security
Data encryption (Computer science)
Algorithms
Application software
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptosystem (DE-588)4209132-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kryptologie (DE-588)4033329-2 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Interaktives Beweissystem (DE-588)4648334-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Schlüsselaustauschprotokoll (DE-588)1029440018 gnd
Beweisbarkeit (DE-588)7578966-8 gnd
Hash-Algorithmus (DE-588)4323071-4 gnd
Chiffrierung (DE-588)4352893-4 gnd
Elektronische Unterschrift (DE-588)4269037-7 gnd
subject_GND (DE-588)4830502-9
(DE-588)4209132-9
(DE-588)4274324-2
(DE-588)4033329-2
(DE-588)4709127-7
(DE-588)4648334-2
(DE-588)4011144-1
(DE-588)1029440018
(DE-588)7578966-8
(DE-588)4323071-4
(DE-588)4352893-4
(DE-588)4269037-7
(DE-588)1071861417
title Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings
title_auth Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings
title_exact_search Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings
title_full Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.)
title_fullStr Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.)
title_full_unstemmed Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.)
title_short Provable security
title_sort provable security 11th international conference provsec 2017 xi an china october 23 25 2017 proceedings
title_sub 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings
topic Computer science
Computer security
Data encryption (Computer science)
Algorithms
Application software
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Kryptoanalyse (DE-588)4830502-9 gnd
Kryptosystem (DE-588)4209132-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Kryptologie (DE-588)4033329-2 gnd
Sicherheitsprotokoll (DE-588)4709127-7 gnd
Interaktives Beweissystem (DE-588)4648334-2 gnd
Datensicherung (DE-588)4011144-1 gnd
Schlüsselaustauschprotokoll (DE-588)1029440018 gnd
Beweisbarkeit (DE-588)7578966-8 gnd
Hash-Algorithmus (DE-588)4323071-4 gnd
Chiffrierung (DE-588)4352893-4 gnd
Elektronische Unterschrift (DE-588)4269037-7 gnd
topic_facet Computer science
Computer security
Data encryption (Computer science)
Algorithms
Application software
Computers and civilization
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Kryptoanalyse
Kryptosystem
Computersicherheit
Kryptologie
Sicherheitsprotokoll
Interaktives Beweissystem
Datensicherung
Schlüsselaustauschprotokoll
Beweisbarkeit
Hash-Algorithmus
Chiffrierung
Elektronische Unterschrift
Konferenzschrift
volume_link (DE-604)BV000000607
work_keys_str_mv AT provsecxian provablesecurity11thinternationalconferenceprovsec2017xianchinaoctober23252017proceedings
AT okamototatsuaki provablesecurity11thinternationalconferenceprovsec2017xianchinaoctober23252017proceedings