Security, privacy, and applied cryptography engineering : Second international conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /
<p>This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.</p><p>The 11 papers presented were carefully reviewed and selecte...
Saved in:
| Corporate Author: | |
|---|---|
| Other Authors: | , |
| Format: | eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg
Imprint: Springer
2012.
|
| Series: | Lecture Notes in Computer Science
|
| Subjects: | |
| Online Access: | Click here to view the full text content |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| LEADER | 02449nam a2200433 i 4500 | ||
|---|---|---|---|
| 001 | vtls000106299 | ||
| 003 | MY-ArUMP | ||
| 005 | 20210731152133.0 | ||
| 006 | m fo d | ||
| 007 | cr nn 008mamaa | ||
| 008 | 121201s2012 gw | fs |||| 0|eng d | ||
| 020 | |a 9783642344169 | ||
| 039 | 9 | |a 201305281741 |b SMI |c 201212010032 |d NY |y 201211141248 |z SMR | |
| 040 | |a MYPMP |b eng |c MYPMP |e rda | ||
| 245 | 1 | 0 | |a Security, privacy, and applied cryptography engineering : |b Second international conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings / |c edited by Andrey Bogdanov, Somitra Sanadhya. |
| 264 | 1 | |a Berlin, Heidelberg |b Imprint: Springer |c 2012. | |
| 300 | |a 1 Online resource (XII, 173 pages) |b 29 illustration, digital. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resources |b nr |2 rdacarrie | ||
| 490 | 0 | |a Lecture Notes in Computer Science |x 0302-9743 | |
| 520 | |a <p>This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.</p><p>The 11 papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems, physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.</p> | ||
| 650 | 0 | |a Computer science. | |
| 650 | 0 | |a Computer Communication Networks. | |
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Data encryption (Computer science). | |
| 650 | 0 | |a Computer software. | |
| 650 | 0 | |a Information Systems. | |
| 700 | 1 | |a Sanadhya, Somitra. | |
| 700 | 1 | |a Bogdanov, Andrey. | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer eBooks | |
| 776 | 0 | 8 | |i Printed edition: |z 9783642344152 |
| 830 | 0 | |a Lecture Notes in Computer Science |x 0302-9743 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-34416-9 |y Click here to view the full text content |
| 942 | |2 lcc |c BK-EBOOK | ||
| 949 | |a VIRTUAITEM |d 10011 |f 1 |x 9 | ||
| 999 | |c 49150 |d 49150 | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |7 0 |9 44785 |a FSGM |b FSGM |d 2021-07-31 |l 0 |r 2021-07-31 |t 1 |w 2021-07-31 |y BK-EBOOK | ||