LEADER 04211nam 22008175 450 001 9910483890103321 005 20200705084705.0 010 $a3-319-13257-1 024 7 $a10.1007/978-3-319-13257-0 035 $a(CKB)3710000000306181 035 $a(SSID)ssj0001386550 035 $a(PQKBManifestationID)11817458 035 $a(PQKBTitleCode)TC0001386550 035 $a(PQKBWorkID)11374444 035 $a(PQKB)11120977 035 $a(DE-He213)978-3-319-13257-0 035 $a(MiAaPQ)EBC5579642 035 $a(PPN)183094689 035 $a(EXLCZ)993710000000306181 100 $a20141103d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security $e17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings /$fedited by Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 570 p. 95 illus.) 225 1 $aSecurity and Cryptology ;$v8783 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-13256-3 327 $aPublic-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security. 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security. 410 0$aSecurity and Cryptology ;$v8783 606 $aComputer security 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aSpecial purpose computers 606 $aComputers and civilization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aSpecial purpose computers. 615 0$aComputers and civilization. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aMath Applications in Computer Science. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputers and Society. 676 $a005.8 702 $aChow$b Sherman S.M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCamenisch$b Jan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHui$b Lucas C.K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYiu$b Siu Ming$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483890103321 996 $aInformation Security$9771885 997 $aUNINA