LEADER 04994nam 22008295 450 001 996466025203316 005 20200630042351.0 010 $a3-642-40588-6 024 7 $a10.1007/978-3-642-40588-4 035 $a(CKB)3710000000015936 035 $a(SSID)ssj0000988273 035 $a(PQKBManifestationID)11539229 035 $a(PQKBTitleCode)TC0000988273 035 $a(PQKBWorkID)10950052 035 $a(PQKB)10416090 035 $a(DE-He213)978-3-642-40588-4 035 $a(MiAaPQ)EBC3093102 035 $a(PPN)172429714 035 $a(EXLCZ)993710000000015936 100 $a20130809d2013 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Engineering and Intelligence Informatics$b[electronic resource] $eCD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings /$fedited by Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XIV, 466 p. 122 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8128 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-40587-8 327 $aSymmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software and hardware implementation of cryptographic algorithms -- Database encryption -- Interaction between cryptographic theory and implementation issues -- Cyber security and dependability -- Network security and privacy -- Multimedia technology for homeland defense. 330 $aThis volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v8128 606 $aComputer communication systems 606 $aApplication software 606 $aArtificial intelligence 606 $aAlgorithms 606 $aInformation storage and retrieval 606 $aData encryption (Computer science) 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aArtificial intelligence. 615 0$aAlgorithms. 615 0$aInformation storage and retrieval. 615 0$aData encryption (Computer science). 615 14$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aArtificial Intelligence. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Storage and Retrieval. 615 24$aCryptology. 676 $a005.82 702 $aCuzzocrea$b Alfredo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKittl$b Christian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSimos$b Dimitris E$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWeippl$b Edgar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Lida$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466025203316 996 $aSecurity Engineering and Intelligence Informatics$92829945 997 $aUNISA