Normal view MARC view ISBD view

Applied Cryptography and Network Security [electronic resource] : 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings / edited by Javier López, Gene Tsudik.

Contributor(s): López, Javier [editor.] | Tsudik, Gene [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 6715Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XIII, 552 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642215544.Subject(s): Cryptography | Data encryption (Computer science) | Computer science -- Mathematics | Discrete mathematics | Computer networks  | Electronic data processing -- Management | Algorithms | Data protection | Cryptology | Discrete Mathematics in Computer Science | Computer Communication Networks | IT Operations | Algorithms | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.

There are no comments for this item.

Log in to your account to post a comment.