|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-14054-4 |
003 |
DE-He213 |
005 |
20220114233452.0 |
007 |
cr nn 008mamaa |
008 |
141210s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319140544
|9 978-3-319-14054-4
|
024 |
7 |
|
|a 10.1007/978-3-319-14054-4
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security Standardisation Research
|h [electronic resource] :
|b First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings /
|c edited by Liqun Chen, Chris Mitchell.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a X, 257 p. 34 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8893
|
505 |
0 |
|
|a Security standardisation research, including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation.- Improving existing standards.
|
520 |
|
|
|a This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Artificial intelligence-Data processing.
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Science.
|
650 |
2 |
4 |
|a Mathematical Applications in Computer Science.
|
700 |
1 |
|
|a Chen, Liqun.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mitchell, Chris.
|e editor.
|0 (orcid)0000-0002-6118-0055
|1 https://orcid.org/0000-0002-6118-0055
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319140551
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319140537
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8893
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-14054-4
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|