000 03722nam a22005535i 4500
001 u375288
003 SIRSI
005 20160812084317.0
007 cr nn 008mamaa
008 101117s2010 gw | s |||| 0|eng d
020 _a9783642163425
_9978-3-642-16342-5
040 _cMX-MeUAM
050 4 _aTK5105.5-5105.9
082 0 4 _a004.6
_223
100 1 _aBao, Feng.
_eeditor.
245 1 0 _aInformation Security and Cryptology
_h[recurso electrónico] :
_b5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers /
_cedited by Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIII, 460p. 75 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6151
520 _aThe5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti?c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re?ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Encryption.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aSystems and Data Security.
650 2 4 _aComputers and Society.
700 1 _aYung, Moti.
_eeditor.
700 1 _aLin, Dongdai.
_eeditor.
700 1 _aJing, Jiwu.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642163418
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6151
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-16342-5
596 _a19
942 _cLIBRO_ELEC
999 _c203168
_d203168