|
|
|
|
LEADER |
02765nam a22005655i 4500 |
001 |
978-3-319-14054-4 |
003 |
DE-He213 |
005 |
20151204154551.0 |
007 |
cr nn 008mamaa |
008 |
141210s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319140544
|9 978-3-319-14054-4
|
024 |
7 |
|
|a 10.1007/978-3-319-14054-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Security Standardisation Research
|h [electronic resource] :
|b First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings /
|c edited by Liqun Chen, Chris Mitchell.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a X, 257 p. 34 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8893
|
505 |
0 |
|
|a Security standardisation research, including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation.- Improving existing standards.
|
520 |
|
|
|a This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Structures.
|
650 |
2 |
4 |
|a Math Applications in Computer Science.
|
700 |
1 |
|
|a Chen, Liqun.
|e editor.
|
700 |
1 |
|
|a Mitchell, Chris.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319140537
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8893
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-14054-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|