|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-22633-5 |
003 |
DE-He213 |
005 |
20220115065618.0 |
007 |
cr nn 008mamaa |
008 |
110824s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642226335
|9 978-3-642-22633-5
|
024 |
7 |
|
|a 10.1007/978-3-642-22633-5
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Public Key Infrastructures, Services and Applications
|h [electronic resource] :
|b 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers /
|c edited by Jan Camenisch, Costas Lambrinoudakis.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XII, 209 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6711
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2010, held in Athens, Greece, in September 2010. The 14 revised full papers presented together with an invited article were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on authentication mechanisms; privacy preserving techniques; PKI & PKC applications; electronic signature schemes; identity management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Camenisch, Jan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lambrinoudakis, Costas.
|e editor.
|0 (orcid)0000-0003-3101-5347
|1 https://orcid.org/0000-0003-3101-5347
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642226328
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642226342
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6711
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-22633-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|