Normal view MARC view ISBD view

Information Security [electronic resource] : 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings / edited by Xuejia Lai, Jianying Zhou, Hui Li.

Contributor(s): Lai, Xuejia [editor.] | Zhou, Jianying [editor.] | Li, Hui [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 7001Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XIII, 388 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642248610.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Algorithms | Computer science -- Mathematics | Computers, Special purpose | Application software | Data and Information Security | Cryptology | Algorithms | Mathematical Applications in Computer Science | Special Purpose and Application-Based Systems | Computer and Information Systems ApplicationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

There are no comments for this item.

Log in to your account to post a comment.