Security, privacy, and applied cryptography engineering : Second international conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /

<p>This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.</p><p>The 11 papers presented were carefully reviewed and selecte...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Sanadhya, Somitra, Bogdanov, Andrey
Format: eBook
Language:English
Published: Berlin, Heidelberg Imprint: Springer 2012.
Series:Lecture Notes in Computer Science
Subjects:
Online Access:Click here to view the full text content
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02449nam a2200433 i 4500
001 vtls000106299
003 MY-ArUMP
005 20210731152133.0
006 m fo d
007 cr nn 008mamaa
008 121201s2012 gw | fs |||| 0|eng d
020 |a 9783642344169 
039 9 |a 201305281741  |b SMI  |c 201212010032  |d NY  |y 201211141248  |z SMR 
040 |a MYPMP  |b eng  |c MYPMP  |e rda 
245 1 0 |a Security, privacy, and applied cryptography engineering :  |b Second international conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /  |c edited by Andrey Bogdanov, Somitra Sanadhya. 
264 1 |a Berlin, Heidelberg  |b Imprint: Springer  |c 2012. 
300 |a 1 Online resource (XII, 173 pages)  |b 29 illustration, digital. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resources  |b nr  |2 rdacarrie 
490 0 |a Lecture Notes in Computer Science  |x 0302-9743 
520 |a <p>This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011.</p><p>The 11 papers presented were carefully reviewed and selected from 61 submissions.  The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems,  physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.</p> 
650 0 |a Computer science. 
650 0 |a Computer Communication Networks. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer software. 
650 0 |a Information Systems. 
700 1 |a Sanadhya, Somitra. 
700 1 |a Bogdanov, Andrey. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642344152 
830 0 |a Lecture Notes in Computer Science  |x 0302-9743 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34416-9  |y Click here to view the full text content 
942 |2 lcc  |c BK-EBOOK 
949 |a VIRTUAITEM  |d 10011  |f 1  |x 9 
999 |c 49150  |d 49150 
952 |0 0  |1 0  |2 lcc  |4 0  |7 0  |9 44785  |a FSGM  |b FSGM  |d 2021-07-31  |l 0  |r 2021-07-31  |t 1  |w 2021-07-31  |y BK-EBOOK