Advances in information and computer security : 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings /
Saved in:
Meeting name: | International Workshop on Security (5th : 2010 : Kobe, Japan) |
---|---|
Imprint: | Berlin : Springer, 2010. |
Description: | 1 online resource (xiii, 370 pages) : illustrations. |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 6434 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 6434. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11075167 |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | 11075167 | ||
005 | 20170630045920.5 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 101220s2010 gw a ob 101 0 eng d | ||
003 | ICU | ||
010 | |a 2010937763 | ||
040 | |a GW5XE |b eng |e pn |c GW5XE |d E7B |d VLB |d OUN |d CUS |d CEF |d OCLCQ |d COO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d BEDGE |d DKDLA |d OCLCQ |d OCLCO |d YDXCP |d OCL |d OCLCO |d OCLCQ |d OCLCO |d EBLCP |d OCLCQ |d NUI |d OCLCO |d OCLCQ |d VT2 | ||
015 | |a 10,N40 |2 dnb | ||
016 | 7 | |a 1007314044 |2 DE-101 | |
016 | 7 | |a 015703960 |2 Uk | |
019 | |a 694146630 |a 769769687 |a 912408484 |a 964915384 | ||
020 | |a 9783642168253 |q (electronic bk.) | ||
020 | |a 3642168256 |q (electronic bk.) | ||
020 | |z 9783642168246 | ||
020 | |z 3642168248 | ||
024 | 7 | |a 10.1007/978-3-642-16825-3 |2 doi | |
035 | |a (OCoLC)693780118 |z (OCoLC)694146630 |z (OCoLC)769769687 |z (OCoLC)912408484 |z (OCoLC)964915384 | ||
050 | 4 | |a QA76.9.A25 |b I58 2010 | |
072 | 7 | |a QA |2 lcco | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
049 | |a MAIN | ||
111 | 2 | |a International Workshop on Security |n (5th : |d 2010 : |c Kobe, Japan) | |
245 | 1 | 0 | |a Advances in information and computer security : |b 5th international workshop on security, IWSEC 2010, Kobe, Japan, November 22-24, 2010 : proceedings / |c Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.). |
246 | 3 | |a IWSEC 2010 | |
260 | |a Berlin : |b Springer, |c 2010. | ||
300 | |a 1 online resource (xiii, 370 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Lecture notes in computer science, |x 0302-9743 ; |v 6434 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Invited talks -- Encryption -- Data and Web security -- Protocols -- Network security -- Block cipher -- Implementation and real life security. | |
520 | 8 | |a Annotation |b This book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in Kobe, Japan, in November 2010. The 22 revised full papers presented together with 2 invited talk were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on encryption, data and web security, protocols, network security, block cipher, and implementation and real life security. | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458 | |
650 | 0 | |a Computer networks |x Access control |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007008426 | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101490 | |
650 | 1 | 4 | |a Computer Science. |
650 | 2 | 4 | |a Systems and Data Security. |
650 | 2 | 4 | |a Management of Computing and Information Systems. |
650 | 2 | 4 | |a Data Encryption. |
650 | 2 | 4 | |a Computers and Society. |
650 | 2 | 4 | |a Algorithm Analysis and Problem Complexity. |
650 | 7 | |a Informatique. |2 eclas | |
650 | 7 | |a Computer networks |x Access control. |2 fast |0 (OCoLC)fst00872298 | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Kryptologie. |2 swd | |
650 | 7 | |a Elektronische Unterschrift. |2 swd | |
650 | 7 | |a Sicherheitsprotokoll. |2 swd | |
650 | 7 | |a Rechnernetz. |2 swd | |
650 | 7 | |a Computersicherheit. |2 swd | |
650 | 7 | |a Datensicherung. |2 swd | |
650 | 7 | |a Zugriffskontrolle. |2 swd | |
650 | 7 | |a Authentifikation. |2 swd | |
651 | 7 | |a Kobe <2010> |2 swd | |
655 | 4 | |a Electronic books. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
700 | 1 | |a Echizen, Isao. |0 http://id.loc.gov/authorities/names/nb2011001436 |1 http://viaf.org/viaf/263442246 | |
700 | 1 | |a Kunihiro, Noboru. |0 http://id.loc.gov/authorities/names/nb2011001437 |1 http://viaf.org/viaf/165155260 | |
700 | 1 | |a Sasaki, Ryoichi. |0 http://id.loc.gov/authorities/names/n2005022347 |1 http://viaf.org/viaf/11133758 | |
776 | 0 | 8 | |i Print version: |t Advances in information and computer security. |d Berlin : Springer, 2010 |z 9783642168246 |w (OCoLC)681481207 |
830 | 0 | |a Lecture notes in computer science ; |v 6434. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-642-16825-3 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i f7a290fd-4f1d-5bad-b0e4-4eff4d5d6c98 |s bbffc641-e717-550c-b0c1-72c3882aca60 |
928 | |t Library of Congress classification |a QA76.9.A25 I58 2010 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-642-16825-3 |z SpringerLink |g ebooks |i 9884713 |