Advances in Computer Science - ASIAN 2009. Information Security and Privacy 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings /

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Fo...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Datta, Anupam (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Σειρά:Lecture Notes in Computer Science, 5913
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03345nam a22005655i 4500
001 978-3-642-10622-4
003 DE-He213
005 20151204185906.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642106224  |9 978-3-642-10622-4 
024 7 |a 10.1007/978-3-642-10622-4  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Advances in Computer Science - ASIAN 2009. Information Security and Privacy  |h [electronic resource] :  |b 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings /  |c edited by Anupam Datta. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2009. 
300 |a IX, 159 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5913 
505 0 |a “Logic Wins!” -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant. 
520 |a This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme. . 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer programming. 
650 0 |a Computer security. 
650 0 |a Algorithms. 
650 0 |a Computer logic. 
650 0 |a Mathematical logic. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Programming Techniques. 
650 2 4 |a Logics and Meanings of Programs. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Mathematical Logic and Formal Languages. 
700 1 |a Datta, Anupam.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642106217 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5913 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-10622-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)