000 | 02899nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-319-27659-5 | ||
003 | DE-He213 | ||
005 | 20240423125140.0 | ||
007 | cr nn 008mamaa | ||
008 | 151229s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319276595 _9978-3-319-27659-5 |
||
024 | 7 |
_a10.1007/978-3-319-27659-5 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
072 | 7 |
_aUMZ _2thema |
|
082 | 0 | 4 |
_a005.1 _223 |
245 | 1 | 0 |
_aInformation Security _h[electronic resource] : _b16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings / _cedited by Yvo Desmedt. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXIV, 418 p. 52 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7807 |
|
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security, ISC 2013, held in Dallas, Texas, in November 2013. The 16 revised full papers presented together with 14 short papers were carefully reviewed and selected from 70 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: security of operating systems; secret sharing; encryption; malware and Critical infrastructures; cryptanalysis; block ciphers and stream ciphers; entity authentication; usability & risk perception; access control; computer security; privacy attacks; cryptography. | ||
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aCompilers (Computer programs). | |
650 | 0 | _aMachine theory. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aComputer Science Logic and Foundations of Programming. |
650 | 2 | 4 | _aCompilers and Interpreters. |
650 | 2 | 4 | _aFormal Languages and Automata Theory. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aDesmedt, Yvo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319276588 |
776 | 0 | 8 |
_iPrinted edition: _z9783319276601 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7807 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-27659-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c174788 _d174788 |