000 | 03645nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-10622-4 | ||
003 | DE-He213 | ||
005 | 20240730182309.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2009 gw | s |||| 0|eng d | ||
020 |
_a9783642106224 _9978-3-642-10622-4 |
||
024 | 7 |
_a10.1007/978-3-642-10622-4 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aAdvances in Computer Science, Information Security and Privacy _h[electronic resource] : _b13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings / _cedited by Anupam Datta. |
250 | _a1st ed. 2009. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2009. |
|
300 |
_aIX, 159 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5913 |
|
505 | 0 | _a"Logic Wins!" -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant. | |
520 | _aThis book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme. . | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer programming. _94169 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aMachine theory. _9127765 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9127766 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aProgramming Techniques. _9127767 |
650 | 2 | 4 |
_aComputer Science Logic and Foundations of Programming. _942203 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aFormal Languages and Automata Theory. _9127768 |
700 | 1 |
_aDatta, Anupam. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9127769 |
|
710 | 2 |
_aSpringerLink (Online service) _9127770 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642106217 |
776 | 0 | 8 |
_iPrinted edition: _z9783642106231 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v5913 _9127771 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-10622-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91301 _d91301 |