Information security practice and experience : 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings / Feng Bao, Jian Weng (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 6672. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, 2011.Description: 1 online resource (xiii, 448 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783642210310
- 3642210317
- 9783642210303
- 3642210309
- ISPEC 2011
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Data protection -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Protection de l'information (Informatique) -- Congrès
- Informatique
- Computer security
- Data encryption (Computer science)
- Data protection
- informatieontsluiting
- information retrieval
- informatieopslag
- information storage
- computers
- samenleving
- society
- informatiesystemen
- information systems
- computerwetenschappen
- computer sciences
- gegevensbeheer
- data management
- computernetwerken
- computer networks
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 22
- QA76.9.A25 I87 2011
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and author index.
Print version record.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.