|
|
|
|
LEADER |
02610nam a22005775i 4500 |
001 |
10662 |
003 |
DE-He213 |
005 |
20130725200057.0 |
007 |
cr nn 008mamaa |
008 |
100509s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642128271
|9 978-3-642-12827-1
|
024 |
7 |
# |
|a 10.1007/978-3-642-12827-1
|2 doi
|
050 |
# |
4 |
|a TK5105.5-5105.9
|
072 |
# |
7 |
|a UKN
|2 bicssc
|
072 |
# |
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
# |
|a Kwak, Jin.
|e editor.
|
245 |
1 |
0 |
|a Information Security, Practice and Experience
|b 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings /
|c edited by Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|a XIII, 399p. 68 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 6047
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience, ISPEC 2010, held in Seoul, Korea, in May 2010. The 28 papers presented in this volume were carefully reviewed and selected from 91 submissions. They are grouped in sections on cryptanalysis, algorithms and implementations, network security, access control, identity management, trust management, public key cryptography, and security applications.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Computer software.
|
650 |
# |
0 |
|a Information Systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
700 |
1 |
# |
|a Deng, Robert H.
|e editor.
|
700 |
1 |
# |
|a Won, Yoojae.
|e editor.
|
700 |
1 |
# |
|a Wang, Guilin.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642128264
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 6047
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-12827-1
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|