Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed a...
Published in: | Springer eBooks |
---|---|
Corporate Author: | |
Other Authors: | , , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
Series: | Lecture Notes in Computer Science,
|
Subjects: | |
Online Access: | http://dx.doi.org/10.1007/978-3-319-12087-4 Перейти в каталог НБ ТГУ |
LEADER | 03113nam a22005775i 4500 | ||
---|---|---|---|
001 | vtls000544166 | ||
003 | RU-ToGU | ||
005 | 20210922082919.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 gw | s |||| 0|eng d | ||
020 | |a 9783319120874 |9 978-3-319-12087-4 | ||
024 | 7 | |a 10.1007/978-3-319-12087-4 |2 doi | |
035 | |a to000544166 | ||
039 | 9 | |y 201609152215 |z Александр Эльверович Гилязов | |
040 | |a Springer |c Springer |d RU-ToGU | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
245 | 1 | 0 | |a Information Security and Cryptology |h electronic resource |b 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / |c edited by Dongdai Lin, Shouhuai Xu, Moti Yung. |
260 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2014. |9 742221 | ||
300 | |a XIII, 408 p. 51 illus. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 8567 | |
505 | 0 | |a Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security. | |
520 | |a This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security. | ||
650 | 0 | |a Computer Science. |9 155490 | |
650 | 0 | |a Data protection. |9 303937 | |
650 | 0 | |a Data encryption (Computer science). |9 566260 | |
650 | 0 | |a Coding theory. |9 303096 | |
650 | 0 | |a Computer software. |9 303280 | |
650 | 1 | 4 | |a Computer Science. |9 155490 |
650 | 2 | 4 | |a Systems and Data Security. |9 303939 |
650 | 2 | 4 | |a Data Encryption. |9 566261 |
650 | 2 | 4 | |a Coding and Information Theory. |9 303101 |
650 | 2 | 4 | |a Algorithm Analysis and Problem Complexity. |9 303732 |
700 | 1 | |a Lin, Dongdai. |e editor. |9 323437 | |
700 | 1 | |a Xu, Shouhuai. |e editor. |9 451467 | |
700 | 1 | |a Yung, Moti. |e editor. |9 320527 | |
710 | 2 | |a SpringerLink (Online service) |9 143950 | |
773 | 0 | |t Springer eBooks | |
830 | 0 | |a Lecture Notes in Computer Science, |9 279505 | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-319-12087-4 |
856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=401878 | ||
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
950 | |a Computer Science (Springer-11645) | ||
999 | |c 401878 |d 401878 |