LEADER 03974nam 22007815 450 001 996465696903316 005 20200705171125.0 010 $a3-642-25141-2 024 7 $a10.1007/978-3-642-25141-2 035 $a(CKB)3400000000024072 035 $a(SSID)ssj0000609089 035 $a(PQKBManifestationID)11423330 035 $a(PQKBTitleCode)TC0000609089 035 $a(PQKBWorkID)10609162 035 $a(PQKB)11370449 035 $a(DE-He213)978-3-642-25141-2 035 $a(MiAaPQ)EBC3067471 035 $a(PPN)156316501 035 $a(EXLCZ)993400000000024072 100 $a20111022d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Information and Computer Security$b[electronic resource] $e6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings /$fedited by Tetsu Iwata, Masakatsu Nishigaki 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XII, 231 p.) 225 1 $aSecurity and Cryptology ;$v7038 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-25140-4 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption. 410 0$aSecurity and Cryptology ;$v7038 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer communication systems 606 $aAlgorithms 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aIwata$b Tetsu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNishigaki$b Masakatsu$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465696903316 996 $aAdvances in Information and Computer Security$9772313 997 $aUNISA