LEADER 03640nam 22007455 450 001 9910484135103321 005 20201021071915.0 010 $a3-319-14054-X 024 7 $a10.1007/978-3-319-14054-4 035 $a(CKB)3710000000325036 035 $a(SSID)ssj0001408386 035 $a(PQKBManifestationID)11772027 035 $a(PQKBTitleCode)TC0001408386 035 $a(PQKBWorkID)11346668 035 $a(PQKB)11670130 035 $a(DE-He213)978-3-319-14054-4 035 $a(MiAaPQ)EBC5592632 035 $a(PPN)183152409 035 $a(EXLCZ)993710000000325036 100 $a20141210d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Standardisation Research $eFirst International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings /$fedited by Liqun Chen, Chris Mitchell 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (X, 257 p. 34 illus.) 225 1 $aSecurity and Cryptology ;$v8893 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-14053-1 327 $aSecurity standardisation research, including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation.- Improving existing standards. 330 $aThis book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards. 410 0$aSecurity and Cryptology ;$v8893 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aData structures (Computer science) 606 $aComputer science?Mathematics 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aData Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/I15017 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aData structures (Computer science). 615 0$aComputer science?Mathematics. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData Structures. 615 24$aMath Applications in Computer Science. 676 $a004 702 $aChen$b Liqun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484135103321 996 $aSecurity standardisation research$92065770 997 $aUNINA