|
|
|
|
LEADER |
02194nmm a2200409 u 4500 |
001 |
EB000387991 |
003 |
EBX01000000000000000241043 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642245862
|
100 |
1 |
|
|a Joye, Marc
|e [editor]
|
245 |
0 |
0 |
|a Security Aspects in Information Technology
|h Elektronische Ressource
|b First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings
|c edited by Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall
|
250 |
|
|
|a 1st ed. 2011
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2011, 2011
|
300 |
|
|
|a XIV, 187 p. 29 illus., 13 illus. in color
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Mukhopadhyay, Debdeep
|e [editor]
|
700 |
1 |
|
|a Tunstall, Michael
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-24586-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-24586-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 004.6
|
520 |
|
|
|a This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives
|