Information Security Practice and Experience [electronic resource] : 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings / edited by Feng Bao, Jian Weng.
Contributor(s): Bao, Feng [editor.] | Weng, Jian [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 6672Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XIII, 448 p. 46 illus., 32 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642210310.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Computer networks | Information storage and retrieval systems | Computers and civilization | Electronic data processing -- Management | Cryptology | Data and Information Security | Computer Communication Networks | Information Storage and Retrieval | Computers and Society | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.No physical items for this record
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
There are no comments for this item.