Provable Security [recurso electrónico] : 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. Proceedings / edited by Xavier Boyen, Xiaofeng Chen.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 6980Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 399 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642243165Tema(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Data Encryption | Computer Communication Networks | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Systems and Data Security | Computers and SocietyFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.82 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 376772-2001 |
Navegando Biblioteca Electrónica Estantes, Código de colección: Colección de Libros Electrónicos Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA76.9 .A25 Cryptographic Hardware and Embedded Systems – CHES 2011 | QA76.9 .A25 Information Hiding | QA76.9 .A25 Computer Safety, Reliability, and Security | QA76.9 .A25 Provable Security | QA76.9 .A25 Applied Information Security | QA76.9 .A25 Transactions on Data Hiding and Multimedia Security VI | QA76.9 .A25 Information Security |
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement.
19