Information Security Practice and Experience [electronic resource] : 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings / edited by Feng Bao, Jian Weng.
Material type: TextSeries: Lecture Notes in Computer Science ; 6672Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XIII, 448p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642210310Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Information storage and retrieval systems | Information Systems | Computer Science | Data Encryption | Systems and Data Security | Computer Communication Networks | Information Storage and Retrieval | Computers and Society | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.Current library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK9620 |
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
There are no comments on this title.