LEADER 00782nas1 2200277 450 001 990003251420203316 005 20090521175141.0 035 $a000325142 035 $aUSA01000325142 035 $a(ALEPH)000325142USA01 035 $a000325142 100 $a20090521f19..----km-y0itay50------ba 101 $aeng 102 $aGB 105 $ay|||z|||001yy 200 1 $aElllis horwood series in mathematics and its applications 210 $aChichester$cEllis horwood limited$d19... 215 $av.$d23 cm 801 0$aIT$bsalbc$gISBD 912 $a990003251420203316 951 $a519 SMA/$bCBS$c519 959 $aBK 969 $aSCI 979 $aRSIAV6$b90$c20090521$lUSA01$h1751 996 $aElllis horwood series in mathematics and its applications$91119796 997 $aUNISA LEADER 03936nam 22008175 450 001 996465890003316 005 20210106080101.0 010 $a3-642-27901-5 024 7 $a10.1007/978-3-642-27901-0 035 $a(CKB)3400000000025767 035 $a(SSID)ssj0000609748 035 $a(PQKBManifestationID)11412061 035 $a(PQKBTitleCode)TC0000609748 035 $a(PQKBWorkID)10636163 035 $a(PQKB)10314041 035 $a(DE-He213)978-3-642-27901-0 035 $a(MiAaPQ)EBC3071021 035 $a(PPN)159087171 035 $a(EXLCZ)993400000000025767 100 $a20120117d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFoundations and Practice of Security$b[electronic resource] $e4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Pascal Lafourcade 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIII, 253 p.) 225 1 $aSecurity and Cryptology ;$v6888 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-27900-7 330 $aThis book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security. 410 0$aSecurity and Cryptology ;$v6888 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aAlgorithms 606 $aComputer logic 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 608 $aKongress$zParis$y2011. 608 $aConference proceedings.$2fast 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aComputer logic. 615 14$aCryptology. 615 24$aSoftware Engineering. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aLogics and Meanings of Programs. 676 $a005.82 686 $aSS 4800$2rvk 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLafourcade$b Pascal$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aFPS 2011 906 $aBOOK 912 $a996465890003316 996 $aFoundations and practice of security$91904968 997 $aUNISA