Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2017]
|
Schriftenreihe: | Lecture notes in computer science
10592 |
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV044641630 | ||
003 | DE-604 | ||
005 | 20180702 | ||
007 | t| | ||
008 | 171120s2017 xx |||| |||| 10||| eng d | ||
020 | |a 9783319686363 |9 978-3-319-68636-3 | ||
035 | |a (OCoLC)1012497818 | ||
035 | |a (DE-599)BVBBV044641630 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.82 |2 23 | |
111 | 2 | |a ProvSec |n 11. |d 2017 |c Xi'an |j Verfasser |0 (DE-588)1144907934 |4 aut | |
245 | 1 | 0 | |a Provable security |b 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings |c Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) |
264 | 1 | |a Cham |b Springer |c [2017] | |
300 | |a XIII, 508 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 10592 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 4 | |a Application software | |
650 | 4 | |a Computers and civilization | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Computer Appl. in Administrative Data Processing | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Interaktives Beweissystem |0 (DE-588)4648334-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselaustauschprotokoll |0 (DE-588)1029440018 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Beweisbarkeit |0 (DE-588)7578966-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 4 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 0 | 5 | |a Schlüsselaustauschprotokoll |0 (DE-588)1029440018 |D s |
689 | 0 | 6 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 0 | 7 | |a Beweisbarkeit |0 (DE-588)7578966-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 3 | |a Interaktives Beweissystem |0 (DE-588)4648334-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 2 | 1 | |a Interaktives Beweissystem |0 (DE-588)4648334-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 4 | |5 DE-604 | |
689 | 5 | 0 | |a Elektronische Unterschrift |0 (DE-588)4269037-7 |D s |
689 | 5 | |5 DE-604 | |
700 | 1 | |a Okamoto, Tatsuaki |d 1952- |0 (DE-588)133090418 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-319-68637-0 |
830 | 0 | |a Lecture notes in computer science |v 10592 |w (DE-604)BV000000607 |9 10592 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030039590 |
Datensatz im Suchindex
_version_ | 1822409716304707584 |
---|---|
adam_text | |
any_adam_object | |
author2 | Okamoto, Tatsuaki 1952- |
author2_role | edt |
author2_variant | t o to |
author_GND | (DE-588)133090418 |
author_corporate | ProvSec Xi'an |
author_corporate_role | aut |
author_facet | Okamoto, Tatsuaki 1952- ProvSec Xi'an |
author_sort | ProvSec Xi'an |
building | Verbundindex |
bvnumber | BV044641630 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)1012497818 (DE-599)BVBBV044641630 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV044641630</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180702</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">171120s2017 xx |||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319686363</subfield><subfield code="9">978-3-319-68636-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1012497818</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044641630</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ProvSec</subfield><subfield code="n">11.</subfield><subfield code="d">2017</subfield><subfield code="c">Xi'an</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1144907934</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Provable security</subfield><subfield code="b">11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings</subfield><subfield code="c">Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 508 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10592</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Appl. in Administrative Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Schlüsselaustauschprotokoll</subfield><subfield code="0">(DE-588)1029440018</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="7"><subfield code="a">Beweisbarkeit</subfield><subfield code="0">(DE-588)7578966-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Interaktives Beweissystem</subfield><subfield code="0">(DE-588)4648334-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Okamoto, Tatsuaki</subfield><subfield code="d">1952-</subfield><subfield code="0">(DE-588)133090418</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-319-68637-0</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">10592</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">10592</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030039590</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV044641630 |
illustrated | Not Illustrated |
indexdate | 2025-01-27T13:42:19Z |
institution | BVB |
institution_GND | (DE-588)1144907934 |
isbn | 9783319686363 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030039590 |
oclc_num | 1012497818 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | XIII, 508 Seiten Diagramme |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ProvSec 11. 2017 Xi'an Verfasser (DE-588)1144907934 aut Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) Cham Springer [2017] XIII, 508 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 10592 Computer science Computer security Data encryption (Computer science) Algorithms Application software Computers and civilization Management information systems Computer Science Data Encryption Systems and Data Security Computers and Society Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Interaktives Beweissystem (DE-588)4648334-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Schlüsselaustauschprotokoll (DE-588)1029440018 gnd rswk-swf Beweisbarkeit (DE-588)7578966-8 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Elektronische Unterschrift (DE-588)4269037-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s Kryptosystem (DE-588)4209132-9 s Schlüsselaustauschprotokoll (DE-588)1029440018 s Elektronische Unterschrift (DE-588)4269037-7 s Beweisbarkeit (DE-588)7578966-8 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Interaktives Beweissystem (DE-588)4648334-2 s Sicherheitsprotokoll (DE-588)4709127-7 s Hash-Algorithmus (DE-588)4323071-4 s Okamoto, Tatsuaki 1952- (DE-588)133090418 edt Erscheint auch als Online-Ausgabe 978-3-319-68637-0 Lecture notes in computer science 10592 (DE-604)BV000000607 10592 |
spellingShingle | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Lecture notes in computer science Computer science Computer security Data encryption (Computer science) Algorithms Application software Computers and civilization Management information systems Computer Science Data Encryption Systems and Data Security Computers and Society Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Interaktives Beweissystem (DE-588)4648334-2 gnd Datensicherung (DE-588)4011144-1 gnd Schlüsselaustauschprotokoll (DE-588)1029440018 gnd Beweisbarkeit (DE-588)7578966-8 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Chiffrierung (DE-588)4352893-4 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)4709127-7 (DE-588)4648334-2 (DE-588)4011144-1 (DE-588)1029440018 (DE-588)7578966-8 (DE-588)4323071-4 (DE-588)4352893-4 (DE-588)4269037-7 (DE-588)1071861417 |
title | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings |
title_auth | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings |
title_exact_search | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings |
title_full | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) |
title_fullStr | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) |
title_full_unstemmed | Provable security 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.) |
title_short | Provable security |
title_sort | provable security 11th international conference provsec 2017 xi an china october 23 25 2017 proceedings |
title_sub | 11th international conference, ProvSec 2017, Xi'an, China, October 23-25, 2017 : proceedings |
topic | Computer science Computer security Data encryption (Computer science) Algorithms Application software Computers and civilization Management information systems Computer Science Data Encryption Systems and Data Security Computers and Society Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd Interaktives Beweissystem (DE-588)4648334-2 gnd Datensicherung (DE-588)4011144-1 gnd Schlüsselaustauschprotokoll (DE-588)1029440018 gnd Beweisbarkeit (DE-588)7578966-8 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Chiffrierung (DE-588)4352893-4 gnd Elektronische Unterschrift (DE-588)4269037-7 gnd |
topic_facet | Computer science Computer security Data encryption (Computer science) Algorithms Application software Computers and civilization Management information systems Computer Science Data Encryption Systems and Data Security Computers and Society Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Kryptoanalyse Kryptosystem Computersicherheit Kryptologie Sicherheitsprotokoll Interaktives Beweissystem Datensicherung Schlüsselaustauschprotokoll Beweisbarkeit Hash-Algorithmus Chiffrierung Elektronische Unterschrift Konferenzschrift |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT provsecxian provablesecurity11thinternationalconferenceprovsec2017xianchinaoctober23252017proceedings AT okamototatsuaki provablesecurity11thinternationalconferenceprovsec2017xianchinaoctober23252017proceedings |