Information Security and Privacy [recurso electrónico] : 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings / edited by Udaya Parampalli, Philip Hawkes.

Por: Parampalli, Udaya [editor.]Colaborador(es): Hawkes, Philip [editor.] | SpringerLink (Online service)Tipo de material: TextoTextoSeries Lecture Notes in Computer Science ; 6812Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 464 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642224973Tema(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Computational complexity | Computer vision | Information Systems | Computer Science | Data Encryption | Management of Computing and Information Systems | Operating Systems | Computer Communication Networks | Discrete Mathematics in Computer Science | Computer Imaging, Vision, Pattern Recognition and GraphicsFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.82 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónicoTexto En: Springer eBooksResumen: This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos QA76.9 .A25 (Browse shelf(Abre debajo)) 1 No para préstamo 376499-2001

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented  together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

19

Con tecnología Koha