LEADER 04344nam 22008295 450 001 9910483327603321 005 20251226202738.0 010 $a3-642-16342-4 024 7 $a10.1007/978-3-642-16342-5 035 $a(CKB)2670000000056640 035 $a(SSID)ssj0000446545 035 $a(PQKBManifestationID)11282021 035 $a(PQKBTitleCode)TC0000446545 035 $a(PQKBWorkID)10496706 035 $a(PQKB)11555214 035 $a(DE-He213)978-3-642-16342-5 035 $a(MiAaPQ)EBC3066146 035 $a(PPN)149897960 035 $a(BIP)32335599 035 $a(EXLCZ)992670000000056640 100 $a20101117d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology $e5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers /$fedited by Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIII, 460 p. 75 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6151 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-16341-6 320 $aIncludes bibliographical references and index. 330 $aThe5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti'c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re'ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6151 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aData protection 606 $aComputers and civilization 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aData and Information Security 606 $aComputers and Society 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aData protection. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aData and Information Security. 615 24$aComputers and Society. 676 $a004.6 701 $aBao$b Feng$cDr.$0851645 712 12$aInscrypt 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483327603321 996 $aInformation security and cryptology$94202588 997 $aUNINA