|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-642-35404-5 |
003 |
DE-He213 |
005 |
20220113033832.0 |
007 |
cr nn 008mamaa |
008 |
121207s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642354045
|9 978-3-642-35404-5
|
024 |
7 |
|
|a 10.1007/978-3-642-35404-5
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Cryptology and Network Security
|h [electronic resource] :
|b 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings /
|c edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis.
|
250 |
|
|
|a 1st ed. 2012.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XVI, 311 p. 48 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 7712
|
505 |
0 |
|
|a Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Computer science-Mathematics.
|
650 |
|
0 |
|a Discrete mathematics.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Data and Information Security.
|
700 |
1 |
|
|a Pieprzyk, Josef.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Sadeghi, Ahmad-Reza.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Manulis, Mark.
|e editor.
|0 (orcid)0000-0002-1512-9670
|1 https://orcid.org/0000-0002-1512-9670
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642354052
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642354038
|
830 |
|
0 |
|a Security and Cryptology ;
|v 7712
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-642-35404-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|