000 | 03128nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-642-22497-3 | ||
003 | DE-He213 | ||
005 | 20240730185533.0 | ||
007 | cr nn 008mamaa | ||
008 | 110702s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642224973 _9978-3-642-22497-3 |
||
024 | 7 |
_a10.1007/978-3-642-22497-3 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aInformation Security and Privacy _h[electronic resource] : _b16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings / _cedited by Udaya Parampalli, Philip Hawkes. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aXIII, 464 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6812 |
|
520 | _aThis book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9139739 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _9139740 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aComputer Communication Networks. _9139741 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
700 | 1 |
_aParampalli, Udaya. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139742 |
|
700 | 1 |
_aHawkes, Philip. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139743 |
|
710 | 2 |
_aSpringerLink (Online service) _9139744 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642224966 |
776 | 0 | 8 |
_iPrinted edition: _z9783642224980 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6812 _9139745 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-22497-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92878 _d92878 |