000 | 03107nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-319-13257-0 | ||
003 | DE-He213 | ||
005 | 20200421111701.0 | ||
007 | cr nn 008mamaa | ||
008 | 141103s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319132570 _9978-3-319-13257-0 |
||
024 | 7 |
_a10.1007/978-3-319-13257-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security _h[electronic resource] : _b17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings / _cedited by Sherman S. M. Chow, Jan Camenisch, Lucas C. K. Hui, Siu Ming Yiu. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXVIII, 570 p. 95 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8783 |
|
505 | 0 | _aPublic-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security. | |
520 | _aThis book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSpecial purpose computers. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 | _aComputers and civilization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aMath Applications in Computer Science. |
650 | 2 | 4 | _aSpecial Purpose and Application-Based Systems. |
650 | 2 | 4 | _aComputers and Society. |
700 | 1 |
_aChow, Sherman S. M. _eeditor. |
|
700 | 1 |
_aCamenisch, Jan. _eeditor. |
|
700 | 1 |
_aHui, Lucas C. K. _eeditor. |
|
700 | 1 |
_aYiu, Siu Ming. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319132563 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8783 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-13257-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c55003 _d55003 |