Cargando…

Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings /

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topica...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Takagi, Tsuyoshi (Editor ), Wang, Guilin (Editor ), Qin, Zhiguang (Editor ), Jiang, Shaoquan (Editor ), Yu, Yong (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Edición:1st ed. 2012.
Colección:Security and Cryptology ; 7496
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-33272-2
003 DE-He213
005 20220115073423.0
007 cr nn 008mamaa
008 120822s2012 gw | s |||| 0|eng d
020 |a 9783642332722  |9 978-3-642-33272-2 
024 7 |a 10.1007/978-3-642-33272-2  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Provable Security  |h [electronic resource] :  |b 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings /  |c edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu. 
250 |a 1st ed. 2012. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2012. 
300 |a XIII, 337 p. 11 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 7496 
505 0 |a signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security. 
520 |a This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a Electronic data processing-Management. 
650 0 |a Operating systems (Computers). 
650 0 |a Information technology-Management. 
650 0 |a Computers and civilization. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a IT Operations. 
650 2 4 |a Operating Systems. 
650 2 4 |a Computer Application in Administrative Data Processing. 
650 2 4 |a Computers and Society. 
700 1 |a Takagi, Tsuyoshi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wang, Guilin.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Qin, Zhiguang.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jiang, Shaoquan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Yu, Yong.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642332739 
776 0 8 |i Printed edition:  |z 9783642332715 
830 0 |a Security and Cryptology ;  |v 7496 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-33272-2  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)