Dynamic Secrets in Communication Security:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041723617 | ||
003 | DE-604 | ||
005 | 20150323 | ||
007 | cr|uuu---uuuuu | ||
008 | 140307s2014 xx a||| o|||| 00||| eng d | ||
020 | |a 9781461478317 |c Online |9 978-1-4614-7831-7 | ||
024 | 7 | |a 10.1007/978-1-4614-7831-7 |2 doi | |
035 | |a (OCoLC)857996103 | ||
035 | |a (DE-599)BVBBV041723617 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-861 |a DE-Aug4 |a DE-29 |a DE-634 |a DE-739 |a DE-355 | ||
082 | 0 | |a 610 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Xiao, Shen |e Verfasser |4 aut | |
245 | 1 | 0 | |a Dynamic Secrets in Communication Security |c by Sheng Xiao, Weibo Gong, Don Towsley |
264 | 1 | |a New York, NY ; s.l. |b Springer New York |c 2014 | |
264 | 1 | |b Imprint: Springer | |
300 | |a 1 Online-Ressource (XI, 136 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record | ||
533 | |a Online-Ausgabe |d 2013 |e Online-Ressource (XI, 136 p. 41 illus) |f Springer eBook Collection / Computer Science |7 s2013 |n Electronic reproduction; Available via World Wide Web | ||
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Telekommunikation |0 (DE-588)4059360-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenstruktur |0 (DE-588)4011146-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenstruktur |0 (DE-588)4011146-5 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 2 | |a Telekommunikation |0 (DE-588)4059360-5 |D s |
689 | 0 | 3 | |a Computerunterstützte Kommunikation |0 (DE-588)4535905-2 |D s |
689 | 0 | 4 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gong, Weibo |4 aut | |
700 | 1 | |a Towsley, Don |4 aut | |
776 | 0 | 8 | |i Reproduktion von |a Xiao, Shen |t Dynamic Secrets in Communication Security |d 2014 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4614-7830-0 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-7831-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027170537&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027170537&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027170537 | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-522 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-7831-7 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819330962893307904 |
---|---|
adam_text | DYNAMIC SECRETS IN COMMUNICATION SECURITY
/ XIAO, SHENG
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
COMMUNICATION SECURITY AND KEY SAFETY
DYNAMIC SECRETS
DYNAMIC WIRELESS SECURITY
DYNAMIC KEY MANAGEMENT IN A SMART GRID
SECRECY IN COMMUNICATIONS
RELIABILITY ANALYSIS FOR COMMUNICATION SECURITY
FUTURE APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DYNAMIC SECRETS IN COMMUNICATION SECURITY
/ XIAO, SHENG
: 2014
ABSTRACT / INHALTSTEXT
DYNAMIC SECRETS ARE CONSTANTLY GENERATED AND UPDATED FROM MESSAGES
EXCHANGED BETWEEN TWO COMMUNICATION USERS. WHEN DYNAMIC SECRETS ARE USED
AS A COMPLEMENT TO EXISTING SECURE COMMUNICATION SYSTEMS, A STOLEN KEY
OR PASSWORD CAN BE QUICKLY AND AUTOMATICALLY REVERTED TO ITS SECRET
STATUS WITHOUT DISRUPTING COMMUNICATION. DYNAMIC SECRETS IN
COMMUNICATION SECURITY PRESENTS UNIQUE SECURITY PROPERTIES AND
APPLICATION STUDIES FOR THIS TECHNOLOGY. PASSWORD THEFT AND KEY THEFT NO
LONGER POSE SERIOUS SECURITY THREATS WHEN PARTIES FREQUENTLY USE DYNAMIC
SECRETS. THIS BOOK ALSO ILLUSTRATES THAT A DYNAMIC SECRET BASED SECURITY
SCHEME GUARANTEES IMPERSONATION ATTACKS ARE DETECTED EVEN IF AN
ADVERSARY STEALS A USER’S PASSWORD OR THEIR KEY IS LOST. PRACTITIONERS
AND RESEARCHERS WORKING IN NETWORK SECURITY OR WIRELESS COMMUNICATIONS
WILL FIND THIS BOOK A MUST-HAVE REFERENCE. DYNAMIC SECRETS IN
COMMUNICATION SECURITY IS ALSO A VALUABLE SECONDARY TEXT FOR
ADVANCED-LEVEL STUDENTS IN COMPUTER SCIENCE AND ELECTRICAL ENGINEERING
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Xiao, Shen Gong, Weibo Towsley, Don |
author_facet | Xiao, Shen Gong, Weibo Towsley, Don |
author_role | aut aut aut |
author_sort | Xiao, Shen |
author_variant | s x sx w g wg d t dt |
building | Verbundindex |
bvnumber | BV041723617 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)857996103 (DE-599)BVBBV041723617 |
dewey-full | 610 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 610 - Medicine and health |
dewey-raw | 610 |
dewey-search | 610 |
dewey-sort | 3610 |
dewey-tens | 610 - Medicine and health |
discipline | Informatik Medizin |
doi_str_mv | 10.1007/978-1-4614-7831-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04034nam a2200721 c 4500</leader><controlfield tag="001">BV041723617</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150323 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140307s2014 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461478317</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4614-7831-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-7831-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)857996103</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041723617</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">610</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Xiao, Shen</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dynamic Secrets in Communication Security</subfield><subfield code="c">by Sheng Xiao, Weibo Gong, Don Towsley</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY ; s.l.</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 136 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="d">2013</subfield><subfield code="e">Online-Ressource (XI, 136 p. 41 illus)</subfield><subfield code="f">Springer eBook Collection / Computer Science</subfield><subfield code="7">s2013</subfield><subfield code="n">Electronic reproduction; Available via World Wide Web</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikation</subfield><subfield code="0">(DE-588)4059360-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Telekommunikation</subfield><subfield code="0">(DE-588)4059360-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computerunterstützte Kommunikation</subfield><subfield code="0">(DE-588)4535905-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gong, Weibo</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Towsley, Don</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Xiao, Shen</subfield><subfield code="t">Dynamic Secrets in Communication Security</subfield><subfield code="d">2014</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4614-7830-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027170537&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027170537&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027170537</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-7831-7</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041723617 |
illustrated | Illustrated |
indexdate | 2024-12-20T16:53:34Z |
institution | BVB |
isbn | 9781461478317 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027170537 |
oclc_num | 857996103 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-861 DE-Aug4 DE-29 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 136 p.) Ill. |
psigel | ZDB-2-SCS |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer New York Imprint: Springer |
record_format | marc |
spellingShingle | Xiao, Shen Gong, Weibo Towsley, Don Dynamic Secrets in Communication Security Chiffrierung (DE-588)4352893-4 gnd Telekommunikation (DE-588)4059360-5 gnd Datenstruktur (DE-588)4011146-5 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4059360-5 (DE-588)4011146-5 (DE-588)4535905-2 (DE-588)4011134-9 |
title | Dynamic Secrets in Communication Security |
title_auth | Dynamic Secrets in Communication Security |
title_exact_search | Dynamic Secrets in Communication Security |
title_full | Dynamic Secrets in Communication Security by Sheng Xiao, Weibo Gong, Don Towsley |
title_fullStr | Dynamic Secrets in Communication Security by Sheng Xiao, Weibo Gong, Don Towsley |
title_full_unstemmed | Dynamic Secrets in Communication Security by Sheng Xiao, Weibo Gong, Don Towsley |
title_short | Dynamic Secrets in Communication Security |
title_sort | dynamic secrets in communication security |
topic | Chiffrierung (DE-588)4352893-4 gnd Telekommunikation (DE-588)4059360-5 gnd Datenstruktur (DE-588)4011146-5 gnd Computerunterstützte Kommunikation (DE-588)4535905-2 gnd Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Chiffrierung Telekommunikation Datenstruktur Computerunterstützte Kommunikation Datenschutz |
url | https://doi.org/10.1007/978-1-4614-7831-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027170537&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027170537&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT xiaoshen dynamicsecretsincommunicationsecurity AT gongweibo dynamicsecretsincommunicationsecurity AT towsleydon dynamicsecretsincommunicationsecurity |