Information Security and Cryptology
Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Herausgegeben:Pei, Dingyi; Yung, Moti; Lin, Dongdai; Wu, Chuankun
Information Security and Cryptology
Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers
Herausgegeben:Pei, Dingyi; Yung, Moti; Lin, Dongdai; Wu, Chuankun
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007.
The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing,…mehr
- Moti Yung / Peng Liu / Dongdai Lin (Volume editor)Information Security and Cryptology37,99 €
- Ed Dawson / Andrew Clark / Colin Boyd (eds.)Information Security and Privacy42,99 €
- Kijoon Chae / Moti Yung (Hgg.)Information Security Applications83,99 €
- Security Protocols37,99 €
- Mihir Bellare (ed.)Advances in Cryptology - CRYPTO 200037,99 €
- Colin Boyd / Juan M. González Nieto (eds.)Information Security and Privacy42,99 €
- Pil Joong Lee / Jung Hee Cheon (Volume editor)Information Security and Cryptoloy - ICISC 200837,99 €
-
-
-
The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on digital signature schemes, block cipher, key management, zero knowledge and secure computation protocols, secret sharing, stream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
- Produktdetails
- Lecture Notes in Computer Science 4990
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12263486, 978-3-540-79498-1
- 2008
- Seitenzahl: 548
- Erscheinungstermin: 18. Juli 2008
- Englisch
- Abmessung: 235mm x 155mm x 30mm
- Gewicht: 819g
- ISBN-13: 9783540794981
- ISBN-10: 3540794980
- Artikelnr.: 23603781
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 4990
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12263486, 978-3-540-79498-1
- 2008
- Seitenzahl: 548
- Erscheinungstermin: 18. Juli 2008
- Englisch
- Abmessung: 235mm x 155mm x 30mm
- Gewicht: 819g
- ISBN-13: 9783540794981
- ISBN-10: 3540794980
- Artikelnr.: 23603781
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.