LEADER 04139nam 22008055 450 001 996465426003316 005 20200630144643.0 010 $a3-642-24586-2 024 7 $a10.1007/978-3-642-24586-2 035 $a(CKB)2550000000056983 035 $a(SSID)ssj0000610804 035 $a(PQKBManifestationID)11411694 035 $a(PQKBTitleCode)TC0000610804 035 $a(PQKBWorkID)10638086 035 $a(PQKB)11615415 035 $a(DE-He213)978-3-642-24586-2 035 $a(MiAaPQ)EBC3067422 035 $a(PPN)156321890 035 $a(EXLCZ)992550000000056983 100 $a20111013d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Aspects in Information Technology$b[electronic resource] $eFirst International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings /$fedited by Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIV, 187 p. 29 illus., 13 illus. in color.) 225 1 $aSecurity and Cryptology ;$v7011 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-24585-4 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives. 410 0$aSecurity and Cryptology ;$v7011 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a004.6 702 $aJoye$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMukhopadhyay$b Debdeep$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTunstall$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aINFOSECHICOMNET$d(1st :$f2011 :$eHaldia, India) 906 $aBOOK 912 $a996465426003316 996 $aSecurity Aspects in Information Technology$92830304 997 $aUNISA