|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-25141-2 |
003 |
DE-He213 |
005 |
20220115091300.0 |
007 |
cr nn 008mamaa |
008 |
111022s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642251412
|9 978-3-642-25141-2
|
024 |
7 |
|
|a 10.1007/978-3-642-25141-2
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Advances in Information and Computer Security
|h [electronic resource] :
|b 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings /
|c edited by Tetsu Iwata, Masakatsu Nishigaki.
|
250 |
|
|
|a 1st ed. 2011.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2011.
|
300 |
|
|
|a XII, 231 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7038
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Iwata, Tetsu.
|e editor.
|0 (orcid)0000-0002-4729-0979
|1 https://orcid.org/0000-0002-4729-0979
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Nishigaki, Masakatsu.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642251405
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642251429
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7038
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-25141-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|