Information Security [recurso electrónico] : 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings / edited by Xuejia Lai, Jianying Zhou, Hui Li.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 7001Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 388 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642248610Tema(s): Computer science | Software engineering | Data protection | Data encryption (Computer science) | Computer software | Computer Science | Systems and Data Security | Data Encryption | Algorithm Analysis and Problem Complexity | Math Applications in Computer Science | Special Purpose and Application-Based Systems | Information Systems Applications (incl. Internet)Formatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.8 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 376837-2001 |
Navegando Biblioteca Electrónica Estantes, Código de colección: Colección de Libros Electrónicos Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
QA76.9 .A25 Provable Security | QA76.9 .A25 Applied Information Security | QA76.9 .A25 Transactions on Data Hiding and Multimedia Security VI | QA76.9 .A25 Information Security | QA76.9 .A25 Critical Infrastructure Protection V | QA76.9 .A25 Advances in Information and Computer Security | QA76.9 .A25 Information and Communications Security |
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
19