Advances in Information and Computer Security [electronic resource] : 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings / edited by Tetsu Iwata, Masakatsu Nishigaki.
Contributor(s): Iwata, Tetsu [editor.] | Nishigaki, Masakatsu [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 7038Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XII, 231 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642251412.Subject(s): Data protection | Electronic data processing -- Management | Cryptography | Data encryption (Computer science) | Computers and civilization | Computer networks | Algorithms | Data and Information Security | IT Operations | Cryptology | Computers and Society | Computer Communication Networks | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption.This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature; malware detection; mathematical and symmetric cryptography; public key encryption.
There are no comments for this item.