Amazon cover image
Image from Amazon.com

Information Security Practice and Experience [electronic resource] : 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings /

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 6672Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011Description: XIII, 448 p. 46 illus., 32 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642210310
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.824 23
LOC classification:
  • QA268
Online resources: In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in