03411nam 22007095 450 99620729520331620200705143623.03-319-17533-510.1007/978-3-319-17533-1(CKB)3710000000404072(SSID)ssj0001501534(PQKBManifestationID)11830237(PQKBTitleCode)TC0001501534(PQKBWorkID)11446464(PQKB)10037824(DE-He213)978-3-319-17533-1(MiAaPQ)EBC6285242(MiAaPQ)EBC5588308(Au-PeEL)EBL5588308(OCoLC)907468310(PPN)185489109(EXLCZ)99371000000040407220150408d2015 u| 0engurnn|008mamaatxtccrInformation Security Practice and Experience[electronic resource] 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /edited by Javier Lopez, Yongdong Wu1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (XIV, 576 p. 76 illus.) Security and Cryptology ;9065Bibliographic Level Mode of Issuance: Monograph3-319-17532-7 System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve Cryptography -- Authentication -- Attribute-Based Encryption -- Mobile Security.- Theory -- Implementation -- Privacy and Indistinguishability.This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.Security and Cryptology ;9065Computer securityData encryption (Computer science)Management information systemsComputer scienceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer security.Data encryption (Computer science).Management information systems.Computer science.Systems and Data Security.Cryptology.Management of Computing and Information Systems.005.8Lopez Javieredthttp://id.loc.gov/vocabulary/relators/edtWu Yongdongedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996207295203316Information Security Practice and Experience772300UNISA01027nam 2200325 450 99627986020331620231208083625.00-7381-4178-X(CKB)3780000000092129(NjHacI)993780000000092129(EXLCZ)99378000000009212920231208d1949 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierANSI/IEEE Std 186-1948 /Institute of Electrical and Electronics Engineers[Place of publication not identified] :IEEE,1949.1 online resource (399 pages)ANSI/IEEE Std 186-1948: IEEE Standard Methods of Testing Amplitude-Modulation Broadcast ReceiversRadioReceivers and receptionRadioReceivers and reception.621.38418NjHacINjHaclDOCUMENT996279860203316ANSI2072434UNISA