|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-24586-2 |
003 |
DE-He213 |
005 |
20220115050414.0 |
007 |
cr nn 008mamaa |
008 |
111013s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642245862
|9 978-3-642-24586-2
|
024 |
7 |
|
|a 10.1007/978-3-642-24586-2
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
245 |
1 |
0 |
|a Security Aspects in Information Technology
|h [electronic resource] :
|b First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings /
|c edited by Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XIV, 187 p. 29 illus., 13 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7011
|
520 |
|
|
|a This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Joye, Marc.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Mukhopadhyay, Debdeep.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Tunstall, Michael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642245855
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642245879
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7011
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-24586-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|