000 | 03722nam a22005535i 4500 | ||
---|---|---|---|
001 | u375288 | ||
003 | SIRSI | ||
005 | 20160812084317.0 | ||
007 | cr nn 008mamaa | ||
008 | 101117s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642163425 _9978-3-642-16342-5 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aTK5105.5-5105.9 | |
082 | 0 | 4 |
_a004.6 _223 |
100 | 1 |
_aBao, Feng. _eeditor. |
|
245 | 1 | 0 |
_aInformation Security and Cryptology _h[recurso electrónico] : _b5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers / _cedited by Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aXIII, 460p. 75 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6151 |
|
520 | _aThe5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti?c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re?ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aComputers and Society. |
700 | 1 |
_aYung, Moti. _eeditor. |
|
700 | 1 |
_aLin, Dongdai. _eeditor. |
|
700 | 1 |
_aJing, Jiwu. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642163418 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6151 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-16342-5 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c203168 _d203168 |