000 -LEADER |
fixed length control field |
04102nam a22005415i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310144112.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
121026s2012 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783642347047 |
|
978-3-642-34704-7 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
264 #1 - |
-- |
Berlin, Heidelberg : |
-- |
Springer Berlin Heidelberg : |
-- |
Imprint: Springer, |
-- |
2012. |
912 ## - |
-- |
ZDB-2-SCS |
|
-- |
ZDB-2-LNC |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wu, Chuan-Kun. |
Relator term |
editor. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Information Security and Cryptology |
Medium |
[electronic resource] : |
Remainder of title |
7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers / |
Statement of responsibility, etc |
edited by Chuan-Kun Wu, Moti Yung, Dongdai Lin. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
X, 394 p. 56 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Lecture Notes in Computer Science, |
International Standard Serial Number |
0302-9743 ; |
Volume number/sequential designation |
7537 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs. Provable Security -- Boosting Scalability in Anomaly-Based Packed Executable Filtering -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming -- Adleman-Manders-Miller Root Extraction Method Revisited -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator -- Fault Attacks against the Miller Algorithm in Hessian Coordinates -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 -- Non-interactive Deniable Authentication Protocols -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 -- Efficient Self-certified Signatures with Batch Verification -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves -- Weak-Key Class of MISTY1 for Related-Key Differential Attack -- Cryptanalysis of Reduced-Round KLEIN Block Cipher -- An Efficient RSA Implementation without Precomputation -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation -- Towards Attack Resilient Social Network Based Threshold Signing -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Data encryption (Computer science). |
|
Topical term or geographic name as entry element |
Coding theory. |
|
Topical term or geographic name as entry element |
Computer software. |
|
Topical term or geographic name as entry element |
Information systems. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Data Encryption. |
|
Topical term or geographic name as entry element |
Coding and Information Theory. |
|
Topical term or geographic name as entry element |
Algorithm Analysis and Problem Complexity. |
|
Topical term or geographic name as entry element |
Computer Appl. in Administrative Data Processing. |
|
Topical term or geographic name as entry element |
e-Commerce/e-business. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Yung, Moti. |
Relator term |
editor. |
|
Personal name |
Lin, Dongdai. |
Relator term |
editor. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9783642347030 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-3-642-34704-7 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |