| 000 | 04827cam a2200961 a 4500 | ||
|---|---|---|---|
| 001 | ocn733542182 | ||
| 003 | OCoLC | ||
| 005 | 20250703160622.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 110629s2011 gw a ob 101 0 eng d | ||
| 040 |
_aGW5XE _beng _epn _cGW5XE _dOCLCQ _dC$Q _dOCLCQ _dOCLCF _dBEDGE _dOCLCO _dOCL _dOCLCO _dOCLCQ _dVT2 _dIOG _dOCLCA _dBUF _dCEF _dTFW _dOCLCQ _dWYU _dWURST _dAJS _dOCLCO _dCOM _dOCLCO _dOCLCQ _dOCLCO _dOCLCL _dOCLCQ _dOCLCL |
||
| 019 |
_a769767973 _a964876170 _a1005748629 _a1044395502 _a1056413805 _a1066608969 |
||
| 020 |
_a9783642210310 _q(electronic bk.) |
||
| 020 |
_a3642210317 _q(electronic bk.) |
||
| 020 | _a9783642210303 | ||
| 020 | _a3642210309 | ||
| 024 | 7 |
_a10.1007/978-3-642-21031-0 _2doi |
|
| 029 | 1 |
_aNZ1 _b13849406 |
|
| 029 | 1 |
_aNZ1 _b13853765 |
|
| 035 |
_a(OCoLC)733542182 _z(OCoLC)769767973 _z(OCoLC)964876170 _z(OCoLC)1005748629 _z(OCoLC)1044395502 _z(OCoLC)1056413805 _z(OCoLC)1066608969 |
||
| 037 |
_a978-3-642-21030-3 _bSpringer _nhttp://www.springerlink.com |
||
| 050 | 4 |
_aQA76.9.A25 _bI87 2011 |
|
| 072 | 7 |
_aQA _2lcco |
|
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _222 |
| 049 | _aMAIN | ||
| 111 | 2 |
_aISPEC 2011 _d(2011 : _cGuangzhou, China) _942012 |
|
| 245 | 1 | 0 |
_aInformation security practice and experience : _b7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings / _cFeng Bao, Jian Weng (eds.). |
| 246 | 3 | 0 | _aISPEC 2011 |
| 260 |
_aBerlin ; _aNew York : _bSpringer, _c2011. |
||
| 300 |
_a1 online resource (xiii, 448 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture notes in computer science, _x1611-3349 ; _v6672 |
|
| 490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
| 504 | _aIncludes bibliographical references and author index. | ||
| 588 | 0 | _aPrint version record. | |
| 520 | _aThis book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols. | ||
| 650 | 0 |
_aComputer security _vCongresses. _914968 |
|
| 650 | 0 |
_aData encryption (Computer science) _vCongresses. _915030 |
|
| 650 | 0 |
_aData protection _vCongresses. _915989 |
|
| 650 | 6 |
_aSécurité informatique _vCongrès. _917411 |
|
| 650 | 6 |
_aChiffrement (Informatique) _vCongrès. _916510 |
|
| 650 | 6 |
_aProtection de l'information (Informatique) _vCongrès. _917410 |
|
| 650 | 7 |
_aInformatique. _2eclas _914930 |
|
| 650 | 7 |
_aComputer security _2fast _92191 |
|
| 650 | 7 |
_aData encryption (Computer science) _2fast _913647 |
|
| 650 | 7 |
_aData protection _2fast _915990 |
|
| 653 | 0 | 0 | _ainformatieontsluiting |
| 653 | 0 | 0 | _ainformation retrieval |
| 653 | 0 | 0 | _ainformatieopslag |
| 653 | 0 | 0 | _ainformation storage |
| 653 | 0 | 0 | _acomputers |
| 653 | 0 | 0 | _asamenleving |
| 653 | 0 | 0 | _asociety |
| 653 | 0 | 0 | _ainformatiesystemen |
| 653 | 0 | 0 | _ainformation systems |
| 653 | 0 | 0 | _acomputerwetenschappen |
| 653 | 0 | 0 | _acomputer sciences |
| 653 | 0 | 0 | _agegevensbeheer |
| 653 | 0 | 0 | _adata management |
| 653 | 0 | 0 | _acomputernetwerken |
| 653 | 0 | 0 | _acomputer networks |
| 653 | 1 | 0 | _aInformation and Communication Technology (General) |
| 653 | 1 | 0 | _aInformatie- en communicatietechnologie (algemeen) |
| 655 | 2 |
_aCongress _911670 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aBao, Feng, _cDr. _1https://id.oclc.org/worldcat/entity/E39PCjMpqcfj33CXh6rqtdMycX _924095 |
|
| 700 | 1 |
_aWeng, Jian. _q(Jian F.) _1https://id.oclc.org/worldcat/entity/E39PCjChyggfx3H7h9wcHkDhd3 _942013 |
|
| 758 |
_ihas work: _aInformation security practice and experience (Text) _1https://id.oclc.org/worldcat/entity/E39PCGGBDWVKvfKXFbvbfcVPV3 _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 776 | 0 | 8 |
_iPrint version: _tInformation security practice and experience. _dBerlin : Springer, 2011 _z9783642210303 _w(DLC) 2011926870 _w(OCoLC)727705418 |
| 830 | 0 |
_aLecture notes in computer science ; _v6672. _x0302-9743 |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-642-21031-0 |
| 994 |
_a92 _bATIST |
||
| 999 |
_c640892 _d640892 |
||