Information Security [electronic resource] : 14th International Conference, ISC 2011, Xian, China, October 26-29, 2011. Proceedings / edited by Xuejia Lai, Jianying Zhou, Hui Li.

Por: Lai, Xuejia [editor.]Colaborador(es): Zhou, Jianying [editor.] | Li, Hui [editor.]Tipo de material: TextoTextoSeries Lecture Notes in Computer Science, 7001Editor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Descripción: XIII, 388 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783642248610Trabajos contenidos: SpringerLink (Online service)Tema(s): Computer science | Software engineering | Data protection | Data encryption (Computer science) | Computer software | Computer Science | Systems and Data Security | Data Encryption | Algorithm Analysis and Problem Complexity | Math Applications in Computer Science | Special Purpose and Application-Based Systems | Information Systems Applications (incl. Internet)Formatos físicos adicionales: Sin títuloClasificación CDD: 005.8 Clasificación LoC: Libro electrónicoRecursos en línea: de clik aquí para ver el libro electrónico Springer eBooksResumen: This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

ZDB-2-SCS

ZDB-2-LNC

No hay comentarios en este titulo.

para colocar un comentario.