|
|
|
|
LEADER |
09044cam a22020172 4500 |
001 |
0-1651637156 |
003 |
DE-627 |
005 |
20240122105044.0 |
007 |
cr uuu---uuuuu |
008 |
120801s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642319129
|9 978-3-642-31912-9
|
024 |
7 |
|
|a 10.1007/978-3-642-31912-9
|2 doi
|
035 |
|
|
|a (DE-627)1651637156
|
035 |
|
|
|a (DE-576)369428226
|
035 |
|
|
|a (DE-599)BSZ369428226
|
035 |
|
|
|a (OCoLC)809042305
|
035 |
|
|
|a (ZBM)1248.68040
|
035 |
|
|
|a (ZBM)1248.68040
|
035 |
|
|
|a (DE-He213)978-3-642-31912-9
|
035 |
|
|
|a (EBP)04054351X
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *68-06
|2 msc
|
084 |
|
|
|a 94-06
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.62
|2 bkl
|
100 |
1 |
|
|a Kim, Howon
|4 aut
|
245 |
1 |
0 |
|a Information Security and Cryptology - ICISC 2011
|b 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
|c edited by Howon Kim
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2012
|
300 |
|
|
|a Online-Ressource (XII, 512 p. 98 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7259
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol.
|
520 |
|
|
|a This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Computational complexity
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Computational complexity
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Discrete mathematics.
|
655 |
|
7 |
|a Konferenzschrift
|y 2011
|z Seoul
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4317451-6
|0 (DE-627)126769745
|0 (DE-576)211192988
|a Private-Key-Kryptosystem
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4323071-4
|0 (DE-627)128104287
|0 (DE-576)211241636
|a Hash-Algorithmus
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4070085-9
|0 (DE-627)104131403
|0 (DE-576)209179252
|a Rechnernetz
|2 gnd
|
689 |
2 |
1 |
|D s
|0 (DE-588)4709127-7
|0 (DE-627)357053206
|0 (DE-576)215560337
|a Sicherheitsprotokoll
|2 gnd
|
689 |
2 |
2 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
2 |
3 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
2 |
|
|5 DE-101
|
689 |
3 |
0 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
3 |
1 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
3 |
2 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
3 |
3 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
3 |
|
|5 (DE-627)
|
776 |
1 |
|
|z 9783642319112
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|a ICISC (14. : 2011 : Seoul)
|t Information security and cryptology - ICISC 2011
|d Berlin : Springer, 2012
|h XII, 512 S.
|w (DE-627)718838815
|w (DE-576)379598906
|z 3642319114
|z 9783642319112
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7259
|9 7259
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-31912-9
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31912-9
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz369428226cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130405112855
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1248.68040
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://d-nb.info/1023650924/04
|m B:DE-101
|q application/pdf
|v 2013-05-01
|x Verlag
|3 Inhaltsverzeichnis
|
889 |
|
|
|w (DE-627)722257805
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
951 |
|
|
|a BO
|
950 |
|
|
|a Computernetz
|
950 |
|
|
|a Computernetzwerk
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Verbundsystem
|
950 |
|
|
|a Mehrrechnernetz
|
950 |
|
|
|a Vernetzung
|
950 |
|
|
|a Datennetz
|
950 |
|
|
|a Mehrrechnersystem
|
950 |
|
|
|a Verteiltes System
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Geheimcodetechnik
|
950 |
|
|
|a Kryptografie
|
950 |
|
|
|a Kryptographie
|
950 |
|
|
|a Datenverschlüsselung
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Steganographie
|
950 |
|
|
|a Kryptologe
|
950 |
|
|
|a 保密学
|
950 |
|
|
|a 密码学
|
950 |
|
|
|a 保密學
|
950 |
|
|
|a 密碼學
|
950 |
|
|
|a Криптология
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Geheimer Schlüssel
|
950 |
|
|
|a Kryptosystem
|
950 |
|
|
|a System mit geheimen Schlüsseln
|
950 |
|
|
|a Secret Key Encryption
|
950 |
|
|
|a Einschlüsselsystem
|
950 |
|
|
|a Symmetrisches Kryptosystem
|
950 |
|
|
|a Hash-Code
|
950 |
|
|
|a Hash-Funktion
|
950 |
|
|
|a Hash-Verfahren
|
950 |
|
|
|a Schlüsseltransformation
|
950 |
|
|
|a Gestreute Speicherung
|
950 |
|
|
|a Speicherverwaltung
|
950 |
|
|
|a Security Log
|
950 |
|
|
|a Security Protocoll
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31912-9
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3351397208
|z 2012-08-01T10:10:50Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31912-9
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3351397267
|z 2012-08-01T10:10:50Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31912-9
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3351397291
|z 2012-08-01T10:10:50Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31912-9
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3351397348
|z 2012-08-01T10:10:50Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-31912-9
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3351397410
|z 2012-08-01T10:10:50Z
|
980 |
|
|
|a 1651637156
|b 0
|k 1651637156
|o 369428226
|
SOLR
_version_ |
1792253797823676416 |
access_facet |
Electronic Resources |
author |
Kim, Howon |
author_facet |
Kim, Howon |
author_role |
aut |
author_sort |
Kim, Howon |
author_variant |
h k hk |
callnumber-first |
T - Technology |
callnumber-label |
TK5105 |
callnumber-raw |
TK5105.5-5105.9 |
callnumber-search |
TK5105.5-5105.9 |
callnumber-sort |
TK 45105.5 45105.9 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol., This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol. |
ctrlnum |
(DE-627)1651637156, (DE-576)369428226, (DE-599)BSZ369428226, (OCoLC)809042305, (ZBM)1248.68040, (DE-He213)978-3-642-31912-9, (EBP)04054351X |
de15_date |
2012-08-01T10:10:50Z |
dech1_date |
2012-08-01T10:10:50Z |
doi_str_mv |
10.1007/978-3-642-31912-9 |
era_facet |
2011 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung |
finc_class_facet |
Informatik, Technik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2011 Seoul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Seoul |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7259 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651637156 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651637156 |
is_hierarchy_title |
Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |
isbn |
9783642319129 |
isbn_isn_mv |
9783642319112, 3642319114 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651637156 |
language |
English |
last_indexed |
2024-02-29T17:06:55.008Z |
local_heading_facet_dezwi2 |
Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung |
marc024a_ct_mv |
10.1007/978-3-642-31912-9 |
match_str |
kim2012informationsecurityandcryptologyicisc201114thinternationalconferenceseoulkoreanovember30december22011revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7259 |
oclc_num |
809042305 |
physical |
Online-Ressource (XII, 512 p. 98 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
369428226 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3150180 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7259 |
series2 |
Lecture Notes in Computer Science ; 7259, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Kim, Howon aut, Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim, Berlin, Heidelberg Springer 2012, Online-Ressource (XII, 512 p. 98 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7259, SpringerLink Bücher, Literaturangaben, Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol., This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift 2011 Seoul (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, DE-101, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4317451-6 (DE-627)126769745 (DE-576)211192988 Private-Key-Kryptosystem gnd, s (DE-588)4323071-4 (DE-627)128104287 (DE-576)211241636 Hash-Algorithmus gnd, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4709127-7 (DE-627)357053206 (DE-576)215560337 Sicherheitsprotokoll gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, (DE-627), 9783642319112, Buchausg. u.d.T. ICISC (14. : 2011 : Seoul) Information security and cryptology - ICISC 2011 Berlin : Springer, 2012 XII, 512 S. (DE-627)718838815 (DE-576)379598906 3642319114 9783642319112, Lecture notes in computer science 7259 7259 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-31912-9 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-31912-9 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz369428226cov.jpg V:DE-576 X:springer image/jpeg 20130405112855 Cover, https://zbmath.org/?q=an:1248.68040 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1023650924/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, (DE-627)722257805, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-14, DE-14 epn:3351397208 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-15, DE-15 epn:3351397267 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-Ch1, DE-Ch1 epn:3351397291 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3351397348 2012-08-01T10:10:50Z, http://dx.doi.org/10.1007/978-3-642-31912-9 DE-520, DE-520 epn:3351397410 2012-08-01T10:10:50Z |
spellingShingle |
Kim, Howon, Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers, Lecture notes in computer science, 7259, Hash function -- side channel analysis -- public key cryptography.-network and mobile security -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic protocol., This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol., Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift 2011 Seoul, Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung |
swb_id_str |
369428226 |
title |
Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |
title_auth |
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |
title_full |
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim |
title_fullStr |
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim |
title_full_unstemmed |
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers edited by Howon Kim |
title_in_hierarchy |
7259. Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers (2012) |
title_short |
Information Security and Cryptology - ICISC 2011 |
title_sort |
information security and cryptology icisc 2011 14th international conference seoul korea november 30 december 2 2011 revised selected papers |
title_sub |
14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |
title_unstemmed |
Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers |
topic |
Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift 2011 Seoul, Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung |
topic_facet |
Computer Communication Networks, Computer software, Computational complexity, Information Systems, Computer Science, Computer science, Data protection, Data encryption (Computer science), Electronic data processing, Algorithms., Cryptography., Computer networks ., Discrete mathematics., Konferenzschrift, Kryptoanalyse, Kryptologie, Private-Key-Kryptosystem, Hash-Algorithmus, Rechnernetz, Sicherheitsprotokoll, Computersicherheit, Datensicherung |
url |
https://doi.org/10.1007/978-3-642-31912-9, http://dx.doi.org/10.1007/978-3-642-31912-9, https://swbplus.bsz-bw.de/bsz369428226cov.jpg, https://zbmath.org/?q=an:1248.68040, http://deposit.d-nb.de/cgi-bin/dokserv?id=4065131&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1023650924/04 |