000 04827cam a2200961 a 4500
001 ocn733542182
003 OCoLC
005 20250703160622.0
006 m o d
007 cr cn|||||||||
008 110629s2011 gw a ob 101 0 eng d
040 _aGW5XE
_beng
_epn
_cGW5XE
_dOCLCQ
_dC$Q
_dOCLCQ
_dOCLCF
_dBEDGE
_dOCLCO
_dOCL
_dOCLCO
_dOCLCQ
_dVT2
_dIOG
_dOCLCA
_dBUF
_dCEF
_dTFW
_dOCLCQ
_dWYU
_dWURST
_dAJS
_dOCLCO
_dCOM
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
_dOCLCL
019 _a769767973
_a964876170
_a1005748629
_a1044395502
_a1056413805
_a1066608969
020 _a9783642210310
_q(electronic bk.)
020 _a3642210317
_q(electronic bk.)
020 _a9783642210303
020 _a3642210309
024 7 _a10.1007/978-3-642-21031-0
_2doi
029 1 _aNZ1
_b13849406
029 1 _aNZ1
_b13853765
035 _a(OCoLC)733542182
_z(OCoLC)769767973
_z(OCoLC)964876170
_z(OCoLC)1005748629
_z(OCoLC)1044395502
_z(OCoLC)1056413805
_z(OCoLC)1066608969
037 _a978-3-642-21030-3
_bSpringer
_nhttp://www.springerlink.com
050 4 _aQA76.9.A25
_bI87 2011
072 7 _aQA
_2lcco
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_222
049 _aMAIN
111 2 _aISPEC 2011
_d(2011 :
_cGuangzhou, China)
_942012
245 1 0 _aInformation security practice and experience :
_b7th international conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011 : proceedings /
_cFeng Bao, Jian Weng (eds.).
246 3 0 _aISPEC 2011
260 _aBerlin ;
_aNew York :
_bSpringer,
_c2011.
300 _a1 online resource (xiii, 448 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture notes in computer science,
_x1611-3349 ;
_v6672
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
504 _aIncludes bibliographical references and author index.
588 0 _aPrint version record.
520 _aThis book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
650 0 _aComputer security
_vCongresses.
_914968
650 0 _aData encryption (Computer science)
_vCongresses.
_915030
650 0 _aData protection
_vCongresses.
_915989
650 6 _aSécurité informatique
_vCongrès.
_917411
650 6 _aChiffrement (Informatique)
_vCongrès.
_916510
650 6 _aProtection de l'information (Informatique)
_vCongrès.
_917410
650 7 _aInformatique.
_2eclas
_914930
650 7 _aComputer security
_2fast
_92191
650 7 _aData encryption (Computer science)
_2fast
_913647
650 7 _aData protection
_2fast
_915990
653 0 0 _ainformatieontsluiting
653 0 0 _ainformation retrieval
653 0 0 _ainformatieopslag
653 0 0 _ainformation storage
653 0 0 _acomputers
653 0 0 _asamenleving
653 0 0 _asociety
653 0 0 _ainformatiesystemen
653 0 0 _ainformation systems
653 0 0 _acomputerwetenschappen
653 0 0 _acomputer sciences
653 0 0 _agegevensbeheer
653 0 0 _adata management
653 0 0 _acomputernetwerken
653 0 0 _acomputer networks
653 1 0 _aInformation and Communication Technology (General)
653 1 0 _aInformatie- en communicatietechnologie (algemeen)
655 2 _aCongress
_911670
655 7 _aproceedings (reports)
_2aat
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aConference papers and proceedings.
_2lcgft
_96065
655 7 _aActes de congrès.
_2rvmgf
_9609890
700 1 _aBao, Feng,
_cDr.
_1https://id.oclc.org/worldcat/entity/E39PCjMpqcfj33CXh6rqtdMycX
_924095
700 1 _aWeng, Jian.
_q(Jian F.)
_1https://id.oclc.org/worldcat/entity/E39PCjChyggfx3H7h9wcHkDhd3
_942013
758 _ihas work:
_aInformation security practice and experience (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGGBDWVKvfKXFbvbfcVPV3
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tInformation security practice and experience.
_dBerlin : Springer, 2011
_z9783642210303
_w(DLC) 2011926870
_w(OCoLC)727705418
830 0 _aLecture notes in computer science ;
_v6672.
_x0302-9743
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-642-21031-0
994 _a92
_bATIST
999 _c640892
_d640892