Information security and cryptology - ICISC 2011 14th international conference, Seoul, Korea, November 30 - December 2, 2011. revised selected papers /

This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of re...

Descripció completa

Guardat en:
Dades bibliogràfiques
Autor corporatiu: SpringerLink (Online service)
Altres autors: Kim, Howon
Format: eBook
Idioma:English
Publicat: Berlin, Heidelberg Imprint: Springer 2012.
Col·lecció:Lecture Notes in Computer Science 7259
Matèries:
Accés en línia:Click here to view the full text content
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
LEADER 02648nmm a2200445 a 4500
001 vtls000106008
003 MY-ArUMP
005 20210731152137.0
007 cr nn 008mamaa
008 121130s2012 gw | f j ||| 0|eng d
020 |a 9783642319129  |9 978-3-642-31912-9 
039 9 |a 201304181516  |b SMI  |c 201211302326  |d NY  |y 201211141239  |z SMR 
040 |a MYPMP  |b eng  |c MYPMP  |e rda 
245 1 0 |a Information security and cryptology - ICISC 2011  |b 14th international conference, Seoul, Korea, November 30 - December 2, 2011. revised selected papers /  |c edited by Howon Kim. 
264 1 |a Berlin, Heidelberg  |b Imprint: Springer  |c 2012. 
300 |a XII, 512 p. 98 illus.  |b digital. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 0 |a Lecture Notes in Computer Science  |x 0302-9743  |v 7259 
505 0 |a Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol. 
520 |a This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol. 
650 0 |a Computer science. 
650 0 |a Computer Communication Networks. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer software. 
650 0 |a Computational complexity. 
650 0 |a Information Systems. 
700 |a Kim, Howon. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642319112 
830 0 |a Lecture Notes in Computer Science  |x 0302-9743  |v 7259 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-31912-9  |y Click here to view the full text content 
942 |2 lcc  |c BK-EBOOK 
949 |a VIRTUAITEM  |d 10011  |f 1  |x 9 
999 |c 49267  |d 49267 
952 |0 0  |1 0  |2 lcc  |4 0  |7 0  |9 44902  |a FSGM  |b FSGM  |d 2021-07-31  |l 0  |r 2021-07-31  |t 1  |w 2021-07-31  |y BK-EBOOK