000 | 03119nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-642-21518-6 | ||
003 | DE-He213 | ||
005 | 20240730194633.0 | ||
007 | cr nn 008mamaa | ||
008 | 110718s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642215186 _9978-3-642-21518-6 |
||
024 | 7 |
_a10.1007/978-3-642-21518-6 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aInformation Security and Cryptology _h[electronic resource] : _b6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers / _cedited by Xuejia Lai, Moti Yung, Dongdai Lin. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aXIV, 524 p. 91 illus., 31 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6584 |
|
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9157639 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9157640 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aLai, Xuejia. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157641 |
|
700 | 1 |
_aYung, Moti. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157642 |
|
700 | 1 |
_aLin, Dongdai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9157643 |
|
710 | 2 |
_aSpringerLink (Online service) _9157644 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642215179 |
776 | 0 | 8 |
_iPrinted edition: _z9783642215193 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6584 _9157645 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-21518-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c95275 _d95275 |