| 000 | 02748nam a22006015i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-33272-2 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083326.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120822s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642332722 _9978-3-642-33272-2 |
||
| 024 | 7 |
_a10.1007/978-3-642-33272-2 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aTakagi, Tsuyoshi. _eeditor. |
|
| 245 | 1 | 0 |
_aProvable Security _h[electronic resource] : _b6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings / _cedited by Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
| 300 |
_aXIII, 337 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7496 |
|
| 505 | 0 | _asignature schemes -- foundations -- leakage resilence and key escrow -- encryption schemes.- information theoretical security. | |
| 520 | _aThis book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aOperating systems (Computers). | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aOperating Systems. |
| 650 | 2 | 4 | _aComputer Appl. in Administrative Data Processing. |
| 650 | 2 | 4 | _aComputers and Society. |
| 700 | 1 |
_aWang, Guilin. _eeditor. |
|
| 700 | 1 |
_aQin, Zhiguang. _eeditor. |
|
| 700 | 1 |
_aJiang, Shaoquan. _eeditor. |
|
| 700 | 1 |
_aYu, Yong. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642332715 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7496 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-33272-2 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c103608 _d103608 |
||