|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465696903316 |
|
|
Titolo |
Advances in Information and Computer Security [[electronic resource] ] : 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings / / edited by Tetsu Iwata, Masakatsu Nishigaki |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2011.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 231 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 7038 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Management information systems |
Computer science |
Data encryption (Computer science) |
Computers and civilization |
Computer communication systems |
Algorithms |
Systems and Data Security |
Management of Computing and Information Systems |
Cryptology |
Computers and Society |
Computer Communication Networks |
Algorithm Analysis and Problem Complexity |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing |
|
|
|
|
|
|
|
|
|
|
systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption. |
|
|
|
|
|
| |