Applied Cryptography and Network Security [recurso electrónico] : 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings / edited by Javier Lopez, Gene Tsudik.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 6715Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 552 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642215544Tema(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Computational complexity | Information Systems | Computer Science | Data Encryption | Discrete Mathematics in Computer Science | Computer Communication Networks | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Systems and Data SecurityFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.82 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 376303-2001 |
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services.
19