Amazon cover image
Image from Amazon.com

Information security practice and experience : 7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings / Feng Bao, Jian Weng (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 6672. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, 2011.Description: 1 online resource (xiii, 448 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642210310
  • 3642210317
  • 9783642210303
  • 3642210309
Other title:
  • ISPEC 2011
Subject(s): Genre/Form: Additional physical formats: Print version:: Information security practice and experience.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 I87 2011
Online resources: Summary: This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and author index.

Print version record.

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

Powered by Koha