|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-33272-2 |
003 |
DE-He213 |
005 |
20220115073423.0 |
007 |
cr nn 008mamaa |
008 |
120822s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642332722
|9 978-3-642-33272-2
|
024 |
7 |
|
|a 10.1007/978-3-642-33272-2
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Provable Security
|h [electronic resource] :
|b 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings /
|c edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIII, 337 p. 11 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7496
|
505 |
0 |
|
|a signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Information technology-Management.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Computer Application in Administrative Data Processing.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Takagi, Tsuyoshi.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Wang, Guilin.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Qin, Zhiguang.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jiang, Shaoquan.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yu, Yong.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642332739
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642332715
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7496
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-33272-2
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|