|
|
|
|
LEADER |
02833nam a22006135i 4500 |
001 |
978-3-642-33272-2 |
003 |
DE-He213 |
005 |
20151030031210.0 |
007 |
cr nn 008mamaa |
008 |
120822s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642332722
|9 978-3-642-33272-2
|
024 |
7 |
|
|a 10.1007/978-3-642-33272-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Provable Security
|h [electronic resource] :
|b 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings /
|c edited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XIII, 337 p. 11 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7496
|
505 |
0 |
|
|a signature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Operating Systems.
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Takagi, Tsuyoshi.
|e editor.
|
700 |
1 |
|
|a Wang, Guilin.
|e editor.
|
700 |
1 |
|
|a Qin, Zhiguang.
|e editor.
|
700 |
1 |
|
|a Jiang, Shaoquan.
|e editor.
|
700 |
1 |
|
|a Yu, Yong.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642332715
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 7496
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-33272-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|