000 | 02904nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-642-19379-8 | ||
003 | DE-He213 | ||
005 | 20160615111421.0 | ||
007 | cr nn 008mamaa | ||
008 | 110228s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642193798 _9978-3-642-19379-8 |
||
024 | 7 |
_a10.1007/978-3-642-19379-8 _2doi |
|
049 | _aAlfaisal Main Library | ||
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aPublic Key Cryptography – PKC 2011 _h[electronic resource] : _b14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings / _cedited by Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_aXIII, 495 p. 22 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6571 |
|
520 | _aThis book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011. The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
655 | 7 |
_aElectronic books. _2local |
|
700 | 1 |
_aCatalano, Dario. _eeditor. |
|
700 | 1 |
_aFazio, Nelly. _eeditor. |
|
700 | 1 |
_aGennaro, Rosario. _eeditor. |
|
700 | 1 |
_aNicolosi, Antonio. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642193781 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6571 |
|
856 | 4 | 0 | _uhttp://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-642-19379-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 |
_2lcc _cEBOOKS |
||
999 |
_c288834 _d288834 |