Provable Security [recurso electrónico] : 5th International Conference, ProvSec 2011, Xi’an, China, October 16-18, 2011. Proceedings / edited by Xavier Boyen, Xiaofeng Chen.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 6980Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 399 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642243165Tema(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Data Encryption | Computer Communication Networks | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Systems and Data Security | Computers and SocietyFormatos físicos adicionales: Printed edition:: Sin títuloClasificación CDD: 005.82 Clasificación LoC:QA76.9.A25Recursos en línea: Libro electrónico En: Springer eBooksResumen: This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement.Tipo de ítem | Biblioteca actual | Colección | Signatura | Copia número | Estado | Fecha de vencimiento | Código de barras |
---|---|---|---|---|---|---|---|
Libro Electrónico | Biblioteca Electrónica | Colección de Libros Electrónicos | QA76.9 .A25 (Browse shelf(Abre debajo)) | 1 | No para préstamo | 376772-2001 |
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement.
19