Information security and cryptology : (Record no. 639213)

MARC details
000 -LEADER
fixed length control field 07583cam a2201045 a 4500
001 - CONTROL NUMBER
control field ocn405547749
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250703150607.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090622s2009 gw a ob 101 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency GW5XE
Language of cataloging eng
Description conventions pn
Transcribing agency GW5XE
Modifying agency OCLCQ
-- HUA
-- UWW
-- E7B
-- OCLCQ
-- OCLCA
-- OCLCF
-- BEDGE
-- DKDLA
-- OCLCQ
-- OCLCO
-- COO
-- A7U
-- YDXCP
-- IDEBK
-- SLY
-- OCLCO
-- OCL
-- OCLCO
-- OCLCQ
-- OCLCO
-- EBLCP
-- OCLCQ
-- ESU
-- SHS
-- OCLCA
-- OCLCQ
-- UAB
-- OCLCQ
-- OCLCA
-- BUF
-- U3W
-- WYU
-- UX1
-- CNTRU
-- OCLCO
-- OCLCA
-- OCLCQ
-- LUN
-- OCLCQ
-- OCLCO
-- COM
-- OCLCO
-- SFB
-- OCLCQ
-- OCLCO
-- OCLCL
-- OCLCA
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 993291651
Source DE-101
019 ## -
-- 370602506
-- 488555176
-- 647766464
-- 880303100
-- 1069523118
-- 1110200508
-- 1170089147
-- 1171585390
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642014406
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3642014402
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642014390
Qualifying information (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3642014399
Qualifying information (pbk.)
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-01440-6
Source of number or code doi
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000045250819
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000048769917
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000058161107
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000060477704
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000065269355
029 1# - (OCLC)
OCLC library identifier NLGGC
System control number 384366635
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 13046010
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 13659061
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)405547749
Canceled/invalid control number (OCoLC)370602506
-- (OCoLC)488555176
-- (OCoLC)647766464
-- (OCoLC)880303100
-- (OCoLC)1069523118
-- (OCoLC)1110200508
-- (OCoLC)1170089147
-- (OCoLC)1171585390
037 ## - SOURCE OF ACQUISITION
Stock number 978-3-642-01439-0
Source of stock number/acquisition Springer
Note http://www.springerlink.com
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.O63
Item number I57 2009
072 #7 - SUBJECT CATEGORY CODE
Subject category code QA
Source lcco
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 22
084 ## - OTHER CLASSIFICATION NUMBER
Classification number TP309-532
Number source clc
084 ## - OTHER CLASSIFICATION NUMBER
Classification number SS 4800
Number source rvk
084 ## - OTHER CLASSIFICATION NUMBER
Classification number DAT 465f
Number source stub
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element Inscrypt (Conference)
Number of part/section/meeting (4th :
Date of meeting 2008 :
Location of meeting Beijing, China)
9 (RLIN) 35022
245 10 - TITLE STATEMENT
Title Information security and cryptology :
Remainder of title 4th international conference, Inscrypt 2008, Beijing, China, December 14-17, 2008 ; revised selected papers /
Statement of responsibility, etc. Moti Yung, Peng Liu, Dongdai Lin (eds.).
246 3# - VARYING FORM OF TITLE
Title proper/short title Inscrypt 2008
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Berlin ;
-- Heidelberg :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. ©2009.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xiii, 437 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
347 ## - DIGITAL FILE CHARACTERISTICS
Encoding format PDF
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science,
International Standard Serial Number 0302-9743 ;
Volume/sequential designation 5487
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Talks -- The State of Hash Functions and the NIST SHA-3 Competition -- Key Evolution Systems in Untrusted Update Environments -- Secure and Privacy-Preserving Information Brokering -- Digital Signature and Signcryption Schemes -- Provably Secure Convertible Nominative Signature Scheme -- Cryptanalysis of Two Ring Signcryption Schemes -- Efficient Signcryption Key Encapsulation without Random Oracles -- Privacy and Anonymity -- Strong Anonymous Signatures -- Publicly Verifiable Privacy-Preserving Group Decryption -- Privacy for Private Key in Signatures -- Message Authentication Code and Hash Function -- Security of Truncated MACs -- Security Analysis of Multivariate Polynomials for Hashing -- Secure Protocols -- SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming -- Batch ZK Proof and Verification of OR Logic -- Symmetric Cryptography -- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs -- Impossible Differential Analysis of Reduced Round CLEFIA -- Reducible Polynomial over Constructed by Trinomial??LFSR -- Certificateless Cryptography -- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model -- Further Observations on Certificateless Public Key Encryption -- Hardware Implementation and Side Channel Attack -- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing -- New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA -- Wireless Network Security -- A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN -- Key Predistribution Schemes Using Codes in Wireless Sensor Networks -- Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks -- Public Key and Identity Based Cryptography -- On the Computational Efficiency of XTR+ -- A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme -- Inter-domain Identity-Based Proxy Re-encryption -- Access Control and Network Security -- Hardening Botnet by a Rational Botmaster -- Separation of Duty in Trust-Based Collaboration -- Trusted Computing and Applications -- An Integrity Assurance Mechanism for Run-Time Programs -- A Security and Performance Evaluation of Hash-Based RFID Protocols -- Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
Form subdivision Congresses.
9 (RLIN) 15030
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
Form subdivision Congresses.
9 (RLIN) 14592
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Congresses.
9 (RLIN) 14968
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Chiffrement (Informatique)
Form subdivision Congrès.
9 (RLIN) 16510
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptographie
Form subdivision Congrès.
9 (RLIN) 14593
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sécurité informatique
Form subdivision Congrès.
9 (RLIN) 17411
650 07 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
Source of heading or term cct
650 07 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term cct
9 (RLIN) 2191
650 07 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
Source of heading or term cct
9 (RLIN) 13647
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Informatique.
Source of heading or term eclas
9 (RLIN) 14930
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term fast
9 (RLIN) 2191
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
Source of heading or term fast
9 (RLIN) 13647
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Authentifikation
Source of heading or term gnd
9 (RLIN) 20926
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computersicherheit
Source of heading or term gnd
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Datensicherung
Source of heading or term gnd
9 (RLIN) 4974
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Kryptoanalyse
Source of heading or term gnd
9 (RLIN) 24022
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Kryptologie
Source of heading or term gnd
655 #2 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Congress
9 (RLIN) 11670
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term proceedings (reports)
Source of term aat
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings
Source of term fast
9 (RLIN) 6065
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings.
Source of term lcgft
9 (RLIN) 6065
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Actes de congrès.
Source of term rvmgf
9 (RLIN) 609890
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Kongress.
Source of term swd
9 (RLIN) 2843
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Peking (2008)
Source of term swd
9 (RLIN) 976403
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yung, Moti.
9 (RLIN) 19833
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liu, Peng,
Dates associated with a name 1970-
-- https://id.oclc.org/worldcat/entity/E39PCjJVHqVh7q3CJJQtMpqPHy
9 (RLIN) 29403
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lin, Dongdai.
9 (RLIN) 20751
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Inscrypt 2008 (2008 : Beijing, China).
Title Information security and cryptology.
Place, publisher, and date of publication Berlin ; Heidelberg : Springer, ©2009
International Standard Book Number 9783642014390
-- 3642014399
Record control number (OCoLC)319496961
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 5487.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://link.springer.com/10.1007/978-3-642-01440-6">https://link.springer.com/10.1007/978-3-642-01440-6</a>
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL3064167
938 ## -
-- ebrary
-- EBRY
-- ebr10297006
938 ## -
-- ProQuest MyiLibrary Digital eBook Collection
-- IDEB
-- cis23905551
938 ## -
-- YBP Library Services
-- YANK
-- 3075184
994 ## -
-- 92
-- ATIST
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     eBook LNCS e-Library e-Library 28/07/2022   28/07/2022 28/07/2022 eBook

Powered by Koha