Amazon cover image
Image from Amazon.com

Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers / Pil Joong Lee, Jung Hee Cheon (Eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 5461.Publication details: Berlin ; Heidelberg : Springer, ©2009.Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642007309
  • 3642007309
  • 9783642007293
  • 3642007295
Other title:
  • ICISC 2008
Subject(s): Genre/Form: Additional physical formats: Print version:: Information security and cryptology - ICISC 2008.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 I25 2009
Other classification:
  • TP309-532
  • SS 4800
  • DAT 465f
Online resources:
Contents:
Public key encryption -- Key management and secret sharing -- Privacy and digital rights -- Digital signature and voting -- Side channel attack -- Hash and MAC -- Primitives and foundations -- Block and stream.
In: Springer - LINKSummary: Annotation This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes index.

Annotation This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Includes bibliographical references and index.

Print version record.

Public key encryption -- Key management and secret sharing -- Privacy and digital rights -- Digital signature and voting -- Side channel attack -- Hash and MAC -- Primitives and foundations -- Block and stream.

Powered by Koha