000 -LEADER |
fixed length control field |
02455nam a22005175i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310144103.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
111207s2011 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642255168 |
|
978-3-642-25516-8 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.82 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg, |
-- |
2011. |
912 ## - |
-- |
ZDB-2-SCS |
|
-- |
ZDB-2-LNC |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Chen, Liqun. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Cryptography and Coding |
Medium |
[electronic resource] : |
Remainder of title |
13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings / |
Statement of responsibility, etc |
edited by Liqun Chen. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XIII, 497 p. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume number/sequential designation |
7089 |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data structures (Computer science). |
|
Topical term or geographic name as entry element |
Data encryption (Computer science). |
|
Topical term or geographic name as entry element |
Coding theory. |
|
Topical term or geographic name as entry element |
Computer software. |
|
Topical term or geographic name as entry element |
Computational complexity. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Data Encryption. |
|
Topical term or geographic name as entry element |
Coding and Information Theory. |
|
Topical term or geographic name as entry element |
Algorithm Analysis and Problem Complexity. |
|
Topical term or geographic name as entry element |
Data Structures, Cryptology and Information Theory. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Discrete Mathematics in Computer Science. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642255151 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-25516-8 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |