000 05769cam a2200985 a 4500
001 ocn535028478
003 OCoLC
005 20250703151159.0
006 m o d
007 cr cn|||||||||
008 100301s2009 gw ob 101 0 eng d
040 _aGW5XE
_beng
_epn
_cGW5XE
_dOCLCQ
_dCUS
_dWAU
_dCOO
_dE7B
_dOCLCQ
_dOCLCF
_dBEDGE
_dOHS
_dOCLCQ
_dOCLCO
_dYDXCP
_dLEAUB
_dOCLCQ
_dOCLCO
_dOCL
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dVT2
_dSOI
_dOCLCO
_dOCLCA
_dDGU
_dOCLCO
_dSHS
_dUAB
_dESU
_dOCLCQ
_dOCLCA
_dBUF
_dOCLCO
_dCEF
_dU3W
_dOCLCO
_dWYU
_dOCLCA
_dYOU
_dOCLCA
_dAU@
_dOCLCO
_dOL$
_dOCLCQ
_dOCLCO
_dOCLCA
_dOCLCQ
_dLUN
_dOCLCA
_dOCLCO
_dOCL
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
_dSFB
015 _a09,N46,0005
_2dnb
019 _a502171194
_a647854544
_a759831474
_a788186336
_a964888464
_a1005796815
_a1066674277
_a1081181737
_a1086815828
_a1102534639
_a1162786596
_a1171597055
_a1172975508
_a1262681821
_a1451836658
020 _a9783642106224
020 _a3642106226
020 _z9783642106217
020 _z3642106218
020 _a1280383291
020 _a9781280383298
020 _a9786613561213
020 _a6613561215
024 7 _a10.1007/978-3-642-10622-4
_2doi
029 1 _aAU@
_b000048713467
029 1 _aAU@
_b000051314089
029 1 _aAU@
_b000057660292
029 1 _aNLGGC
_b384359590
029 1 _aNZ1
_b13382881
035 _a(OCoLC)535028478
_z(OCoLC)502171194
_z(OCoLC)647854544
_z(OCoLC)759831474
_z(OCoLC)788186336
_z(OCoLC)964888464
_z(OCoLC)1005796815
_z(OCoLC)1066674277
_z(OCoLC)1081181737
_z(OCoLC)1086815828
_z(OCoLC)1102534639
_z(OCoLC)1162786596
_z(OCoLC)1171597055
_z(OCoLC)1172975508
_z(OCoLC)1262681821
_z(OCoLC)1451836658
037 _a978-3-642-10621-7
_bSpringer
_nhttp://www.springerlink.com
050 4 _aQA76.9.A25
_bA853 2009
060 4 _aQA76.9.A25
072 7 _aUM
_2bicssc
072 7 _aUYF
_2bicssc
072 7 _aCOM051000
_2bisacsh
072 7 _aCOM036000
_2bisacsh
082 0 4 _a005.8
_222
049 _aMAIN
111 2 _aAsian Computing Science Conference
_n(13th :
_d2009 :
_cSeoul, Korea)
_937085
245 1 0 _aAdvances in Computer Science - ASIAN 2009. Information Security and Privacy :
_b13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings /
_cAnupam Datta (Ed.).
246 3 _aASIAN 2009
260 _aBerlin ;
_aHeidelberg :
_bSpringer-Verlag,
_c©2009.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
347 _bPDF
490 1 _aLecture notes in computer science ;
_v5913
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
505 0 _a"Logic Wins!" -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant.
520 _aThis book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.
546 _aEnglish.
650 0 _aComputer security
_vCongresses.
_914968
650 0 _aComputer networks
_xAccess control
_vCongresses.
_920423
650 0 _aInternet
_xSecurity measures
_vCongresses.
_916508
650 0 _aData encryption (Computer science)
_vCongresses.
_915030
650 0 _aComputer security.
_92191
650 0 _aComputer networks.
_913287
650 2 _aComputer Security
_92191
650 2 _aComputer Communication Networks
650 6 _aSécurité informatique
_vCongrès.
_917411
650 6 _aInternet
_xSécurité
_xMesures
_vCongrès.
_916512
650 6 _aChiffrement (Informatique)
_vCongrès.
_916510
650 6 _aSécurité informatique.
_918600
650 6 _aRéseaux d'ordinateurs.
_915772
650 7 _aInformatique.
_2eclas
_914930
650 7 _aComputer networks
_2fast
_913287
650 7 _aComputer networks
_xAccess control
_2fast
_920428
650 7 _aComputer security
_2fast
_92191
650 7 _aData encryption (Computer science)
_2fast
_913647
650 7 _aInternet
_xSecurity measures
_2fast
_916516
655 2 _aCongress
_911670
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aDatta, Anupam.
_937087
776 0 8 _iPrint version:
_aAsian Computing Science Conference (13th : 2009 : Seoul, Korea).
_tAdvances in computer science--ASIAN 2009.
_dBerlin ; New York : Springer, ©2009
_z9783642106217
_w(DLC) 2009939838
_w(OCoLC)471802587
830 0 _aLecture notes in computer science ;
_v5913.
856 4 0 _uhttps://link.springer.com/10.1007/978-3-642-10622-4
938 _aYBP Library Services
_bYANK
_n3169713
994 _a92
_bATIST
999 _c639723
_d639723