03712nam 22007695 450 99646542820331620200705232954.03-642-24861-610.1007/978-3-642-24861-0(CKB)2550000000057039(SSID)ssj0000609999(PQKBManifestationID)11373579(PQKBTitleCode)TC0000609999(PQKBWorkID)10623443(PQKB)10401928(DE-He213)978-3-642-24861-0(MiAaPQ)EBC3067406(PPN)156321246(EXLCZ)99255000000005703920111012d2011 u| 0engurnn|008mamaatxtccrInformation Security[electronic resource] 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings /edited by Xuejia Lai, Jianying Zhou, Hui Li1st ed. 2011.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2011.1 online resource (XIII, 388 p.) Security and Cryptology ;7001Bibliographic Level Mode of Issuance: Monograph3-642-24860-8 Includes bibliographical references and index.This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.Security and Cryptology ;7001Computer securityData encryption (Computer science)AlgorithmsComputer science—MathematicsSpecial purpose computersApplication softwareSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Math Applications in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17044Special Purpose and Application-Based Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I13030Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computer security.Data encryption (Computer science).Algorithms.Computer science—Mathematics.Special purpose computers.Application software.Systems and Data Security.Cryptology.Algorithm Analysis and Problem Complexity.Math Applications in Computer Science.Special Purpose and Application-Based Systems.Information Systems Applications (incl. Internet).005.8Lai Xuejiaedthttp://id.loc.gov/vocabulary/relators/edtZhou Jianyingedthttp://id.loc.gov/vocabulary/relators/edtLi Huiedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465428203316Information Security771885UNISA