Information Security and Cryptology - ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of re...
Enregistré dans:
Auteur principal : | |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Information Security and Cryptology - ICISC 2011 : 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers / edited by Howon Kim. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2012 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7259 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Sujets : | |
Documents associés : | Autre format:
Information Security and Cryptology - ICISC 2011 Autre format: Information Security and Cryptology - ICISC 2011 |
LEADER | 03433clm a2200637 4500 | ||
---|---|---|---|
001 | PPN168320614 | ||
003 | http://www.sudoc.fr/168320614 | ||
005 | 20241001155100.0 | ||
010 | |a 978-3-642-31912-9 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-31912-9 |2 DOI |
035 | |a (OCoLC)818322625 | ||
035 | |a Springer978-3-642-31912-9 | ||
035 | |a Springer-11645-978-3-642-31912-9 | ||
100 | |a 20130325d2012 u |0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Information Security and Cryptology - ICISC 2011 |e 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |f edited by Howon Kim. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2012 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7259 | |
330 | |a This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol. | ||
359 | 1 | |a Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol. | |
371 | 0 | |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7259 | |
452 | | | |t Information Security and Cryptology - ICISC 2011 |b Texte imprimé |y 9783642319112 | |
452 | | | |t Information Security and Cryptology - ICISC 2011 |b Texte imprimé |y 9783642319136 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Management of Computing and Information Systems | |
610 | 2 | |a Algorithm Analysis and Problem Complexity | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Discrete Mathematics in Computer Science | |
610 | 2 | |a Cryptology. | |
610 | 2 | |a Algorithms | |
610 | 2 | |a Data and Information Security | |
610 | 2 | |a IT Operations | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 004.6 |v 23 | ||
680 | |a TK5105.5-5105.9 | ||
700 | 1 | |a Kim |b Howon | |
701 | 1 | |a Kim |b Howon |4 651 | |
801 | 3 | |a FR |b Abes |c 20231204 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20231204 |g AACR2 | |
856 | 4 | |5 441099901:830853170 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-31912-9 | |
915 | |5 441099901:830853170 |b SPRING13-00391 | ||
930 | |5 441099901:830853170 |b 441099901 |j g | ||
991 | |5 441099901:830853170 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:11 | ||
997 | |a NUM |b SPRING13-00391 |d NUMpivo |e EM |s d | ||
998 | |a 978223 |