Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers / Pil Joong Lee, Jung Hee Cheon (Eds.).
Material type:
TextSeries: Lecture notes in computer science ; 5461.Publication details: Berlin ; Heidelberg : Springer, ©2009.Description: 1 online resourceContent type: - text
- computer
- online resource
- 9783642007309
- 3642007309
- 9783642007293
- 3642007295
- ICISC 2008
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Computer networks -- Security measures -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Data encryption (Computer science)
- Computer networks -- Security measures
- Computer security
- Informatique
- Computer networks -- Security measures
- Computer security
- Data encryption (Computer science)
- Authentifikation
- Chiffrierung
- Computersicherheit
- Datensicherung
- Digital Rights Management
- Kryptoanalyse
- Kryptologie
- Privatsphäre
- Rechnernetz
- 005.8 22
- QA76.9.A25 I25 2009
- TP309-532
- SS 4800
- DAT 465f
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes index.
Annotation This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.
Includes bibliographical references and index.
Print version record.
Public key encryption -- Key management and secret sharing -- Privacy and digital rights -- Digital signature and voting -- Side channel attack -- Hash and MAC -- Primitives and foundations -- Block and stream.