|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-22497-3 |
003 |
DE-He213 |
005 |
20220115090555.0 |
007 |
cr nn 008mamaa |
008 |
110702s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642224973
|9 978-3-642-22497-3
|
024 |
7 |
|
|a 10.1007/978-3-642-22497-3
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Information Security and Privacy
|h [electronic resource] :
|b 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings /
|c edited by Udaya Parampalli, Philip Hawkes.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XIII, 464 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 6812
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
0 |
|a Image processing-Digital techniques.
|
650 |
|
0 |
|a Computer vision.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|
700 |
1 |
|
|a Parampalli, Udaya.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Hawkes, Philip.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642224966
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642224980
|
830 |
|
0 |
|a Security and Cryptology ;
|v 6812
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-22497-3
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|