Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: SAC Calgary (VerfasserIn)
Weitere Verfasser: Cid, Carlos (HerausgeberIn), Jacobson, Michael J. 1971- (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2019]
Schriftenreihe:Lecture notes in computer science 11349 : Security and cryptology
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-860
DE-861
DE-863
DE-862
DE-523
DE-91
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV045448814
003 DE-604
005 20211210
007 cr|uuu---uuuuu
008 190207s2019 xx a||| o|||| 10||| eng d
020 |a 9783030109707  |c Online  |9 978-3-030-10970-7 
024 7 |a 10.1007/978-3-030-10970-7  |2 doi 
035 |a (ZDB-2-SCS)9783030109707 
035 |a (ZDB-2-LNC)9783030109707 
035 |a (OCoLC)1085384138 
035 |a (DE-599)BVBBV045448814 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a DAT 465  |2 stub 
084 |a DAT 000  |2 stub 
111 2 |a SAC  |n 25.  |d 2018  |c Calgary  |j Verfasser  |0 (DE-588)1176430440  |4 aut 
245 1 0 |a Selected areas in cryptography – SAC 2018  |b 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers  |c Carlos Cid, Michael J. Jacobson Jr (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2019] 
300 |a 1 Online-Ressource (xi, 499 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 11349  |a Security and cryptology 
650 4 |a Systems and Data Security 
650 4 |a Cryptology 
650 4 |a Mobile and Network Security 
650 4 |a Security Services 
650 4 |a Computer Communication Networks 
650 4 |a Probability and Statistics in Computer Science 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer networks / Security measures 
650 4 |a Computer Communication Networks 
650 4 |a Computer science 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
700 1 |a Cid, Carlos  |0 (DE-588)1020927186  |4 edt 
700 1 |a Jacobson, Michael J.  |d 1971-  |0 (DE-588)121455610  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-10969-1 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-10971-4 
830 0 |a Lecture notes in computer science  |v 11349 : Security and cryptology  |w (DE-604)BV014880109  |9 11349 
856 4 0 |u https://doi.org/10.1007/978-3-030-10970-7  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2019 
940 1 |q ZDB-2-LNC_2019 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030834242 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-860  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-863  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-862  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2019  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-10970-7  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2387474
DE-BY-UBM_katkey 5717252
DE-BY-UBM_local_url Verlag
https://doi.org/10.1007/978-3-030-10970-7
DE-BY-UBR_katkey 6101659
_version_ 1823056699918909440
adam_text
any_adam_object
author2 Cid, Carlos
Jacobson, Michael J. 1971-
author2_role edt
edt
author2_variant c c cc
m j j mj mjj
author_GND (DE-588)1020927186
(DE-588)121455610
author_corporate SAC Calgary
author_corporate_role aut
author_facet Cid, Carlos
Jacobson, Michael J. 1971-
SAC Calgary
author_sort SAC Calgary
building Verbundindex
bvnumber BV045448814
classification_rvk SS 4800
classification_tum DAT 465
DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030109707
(ZDB-2-LNC)9783030109707
(OCoLC)1085384138
(DE-599)BVBBV045448814
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-030-10970-7
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV045448814</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211210</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190207s2019 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030109707</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-10970-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-10970-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030109707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030109707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085384138</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045448814</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">SAC</subfield><subfield code="n">25.</subfield><subfield code="d">2018</subfield><subfield code="c">Calgary</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1176430440</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Selected areas in cryptography – SAC 2018</subfield><subfield code="b">25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers</subfield><subfield code="c">Carlos Cid, Michael J. Jacobson Jr (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 499 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11349</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Probability and Statistics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cid, Carlos</subfield><subfield code="0">(DE-588)1020927186</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jacobson, Michael J.</subfield><subfield code="d">1971-</subfield><subfield code="0">(DE-588)121455610</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-10969-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-10971-4</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11349 : Security and cryptology</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">11349</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2019</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2019</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030834242</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2019</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-10970-7</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV045448814
illustrated Illustrated
indexdate 2025-02-03T17:57:29Z
institution BVB
institution_GND (DE-588)1176430440
isbn 9783030109707
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030834242
oclc_num 1085384138
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xi, 499 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2019
ZDB-2-LNC_2019
ZDB-2-LNC ZDB-2-LNC_2019
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers
Lecture notes in computer science
Systems and Data Security
Cryptology
Mobile and Network Security
Security Services
Computer Communication Networks
Probability and Statistics in Computer Science
Computer security
Data encryption (Computer science)
Computer networks / Security measures
Computer science
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4033329-2
(DE-588)1071861417
title Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers
title_auth Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers
title_exact_search Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers
title_full Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers Carlos Cid, Michael J. Jacobson Jr (eds.)
title_fullStr Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers Carlos Cid, Michael J. Jacobson Jr (eds.)
title_full_unstemmed Selected areas in cryptography – SAC 2018 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers Carlos Cid, Michael J. Jacobson Jr (eds.)
title_short Selected areas in cryptography – SAC 2018
title_sort selected areas in cryptography sac 2018 25th international conference calgary ab canada august 15 17 2018 revised selected papers
title_sub 25th international conference, Calgary, AB, Canada, August 15–17, 2018, revised selected papers
topic Systems and Data Security
Cryptology
Mobile and Network Security
Security Services
Computer Communication Networks
Probability and Statistics in Computer Science
Computer security
Data encryption (Computer science)
Computer networks / Security measures
Computer science
Kryptologie (DE-588)4033329-2 gnd
topic_facet Systems and Data Security
Cryptology
Mobile and Network Security
Security Services
Computer Communication Networks
Probability and Statistics in Computer Science
Computer security
Data encryption (Computer science)
Computer networks / Security measures
Computer science
Kryptologie
Konferenzschrift
url https://doi.org/10.1007/978-3-030-10970-7
volume_link (DE-604)BV014880109
work_keys_str_mv AT saccalgary selectedareasincryptographysac201825thinternationalconferencecalgaryabcanadaaugust15172018revisedselectedpapers
AT cidcarlos selectedareasincryptographysac201825thinternationalconferencecalgaryabcanadaaugust15172018revisedselectedpapers
AT jacobsonmichaelj selectedareasincryptographysac201825thinternationalconferencecalgaryabcanadaaugust15172018revisedselectedpapers