|
|
|
|
LEADER |
02707nam a22005775i 4500 |
001 |
11431 |
003 |
DE-He213 |
005 |
20130725203107.0 |
007 |
cr nn 008mamaa |
008 |
101130s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642176197
|9 978-3-642-17619-7
|
024 |
7 |
# |
|a 10.1007/978-3-642-17619-7
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a URY
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
# |
|a Heng, Swee-Huay.
|e editor.
|
245 |
1 |
0 |
|a Cryptology and Network Security
|b 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings /
|c edited by Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|a XIII, 355p. 66 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 6467
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2 invited talks, were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on block ciphers, wireless network security, hash functions, public key cryptography, secure mechanisms, cryptographic protocols, and anonymous credentials.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data structures (Computer science).
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Coding theory.
|
650 |
# |
0 |
|a Computational complexity.
|
650 |
# |
0 |
|a Algebra
|x Data processing.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Symbolic and Algebraic Manipulation.
|
700 |
1 |
# |
|a Wright, Rebecca N.
|e editor.
|
700 |
1 |
# |
|a Goi, Bok-Min.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642176180
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 6467
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-17619-7
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|