LEADER 03732nam 22007695 450 001 996465404903316 005 20220413183230.0 010 $a3-642-21554-8 024 7 $a10.1007/978-3-642-21554-4 035 $a(CKB)2670000000095867 035 $a(SSID)ssj0000530672 035 $a(PQKBManifestationID)11351711 035 $a(PQKBTitleCode)TC0000530672 035 $a(PQKBWorkID)10583576 035 $a(PQKB)11687193 035 $a(DE-He213)978-3-642-21554-4 035 $a(MiAaPQ)EBC3066833 035 $a(PPN)153863773 035 $a(EXLCZ)992670000000095867 100 $a20110613d2011 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security$b[electronic resource] $e9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011, Proceedings /$fedited by Javier López, Gene Tsudik 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIII, 552 p.) 225 1 $aSecurity and Cryptology ;$v6715 300 $aIncludes index. 311 $a3-642-21553-X 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, held in Nerja, Spain, in June 2011. The 31 revised full papers included in this volume were carefully reviewed and selected from 172 submissions. They are organized in topical sessions on malware and intrusion detection; attacks, applied crypto; signatures and friends; eclectic assortment; theory; encryption; broadcast encryption; and security services. 410 0$aSecurity and Cryptology ;$v6715 606 $aData encryption (Computer science) 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aData encryption (Computer science). 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 14$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 676 $a005.82 702 $aLo?pez$b Javier$g(Javier Lo?pez-Mun?oz),$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTsudik$b Gene$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465404903316 996 $aApplied Cryptography and Network Security$9771881 997 $aUNISA