LEADER 04049nam 22007815 450 001 996466054303316 005 20200701064035.0 010 $a3-642-18178-3 024 7 $a10.1007/978-3-642-18178-8 035 $a(CKB)2670000000064752 035 $a(SSID)ssj0000476288 035 $a(PQKBManifestationID)11315891 035 $a(PQKBTitleCode)TC0000476288 035 $a(PQKBWorkID)10479967 035 $a(PQKB)10131598 035 $a(DE-He213)978-3-642-18178-8 035 $a(MiAaPQ)EBC3066338 035 $a(PPN)149906250 035 $a(EXLCZ)992670000000064752 100 $a20110117d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security$b[electronic resource] $e13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers /$fedited by Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIV, 446 p. 113 illus., 41 illus. in color.) 225 1 $aSecurity and Cryptology ;$v6531 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-18177-5 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010. The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory. 410 0$aSecurity and Cryptology ;$v6531 606 $aComputer security 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science?Mathematics 606 $aSpecial purpose computers 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aMath Applications in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17044 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science?Mathematics. 615 0$aSpecial purpose computers. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aMath Applications in Computer Science. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aBurmester$b Mike$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTsudik$b Gene$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMagliveras$b Spyros S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aIlic$b Ivana$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466054303316 996 $aInformation Security$9771885 997 $aUNISA