Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/2666
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChen, Xiaofeng, ; editor. ;en_US
dc.contributor.authorLin, Dongdai, ; editor. ;en_US
dc.contributor.authorYung, Moti, ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:41Z-
dc.date.available2020-05-17T08:39:41Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319751603 ; 978-3-319-75160-3 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2666-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.description42 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319751597 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. ;en_US
dc.description.statementofresponsibilityedited by Xiaofeng Chen, Dongdai Lin, Moti Yung.en_US
dc.format.extentXXI, 530 pages 84 illustrations : ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10726 ;en_US
dc.relation.ispartofseriesLecture notes in computer science. ; 0302-9743 ; ; 10726. ;en_US
dc.relation.haspart9783319751603.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectData Miningen_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.titleInformation Security and Cryptologyen_US
dc.title.alternative13th International Conference, Inscrypt 2017, Xi'an, China, November 3ee5, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319751603.pdf21.44 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChen, Xiaofeng, ; editor. ;en_US
dc.contributor.authorLin, Dongdai, ; editor. ;en_US
dc.contributor.authorYung, Moti, ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:41Z-
dc.date.available2020-05-17T08:39:41Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319751603 ; 978-3-319-75160-3 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2666-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.description42 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319751597 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. ;en_US
dc.description.statementofresponsibilityedited by Xiaofeng Chen, Dongdai Lin, Moti Yung.en_US
dc.format.extentXXI, 530 pages 84 illustrations : ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10726 ;en_US
dc.relation.ispartofseriesLecture notes in computer science. ; 0302-9743 ; ; 10726. ;en_US
dc.relation.haspart9783319751603.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectData Miningen_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.titleInformation Security and Cryptologyen_US
dc.title.alternative13th International Conference, Inscrypt 2017, Xi'an, China, November 3ee5, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319751603.pdf21.44 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChen, Xiaofeng, ; editor. ;en_US
dc.contributor.authorLin, Dongdai, ; editor. ;en_US
dc.contributor.authorYung, Moti, ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:41Z-
dc.date.available2020-05-17T08:39:41Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319751603 ; 978-3-319-75160-3 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2666-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.description42 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319751597 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. ;en_US
dc.description.statementofresponsibilityedited by Xiaofeng Chen, Dongdai Lin, Moti Yung.en_US
dc.format.extentXXI, 530 pages 84 illustrations : ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10726 ;en_US
dc.relation.ispartofseriesLecture notes in computer science. ; 0302-9743 ; ; 10726. ;en_US
dc.relation.haspart9783319751603.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science) ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectData Miningen_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.titleInformation Security and Cryptologyen_US
dc.title.alternative13th International Conference, Inscrypt 2017, Xi'an, China, November 3ee5, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319751603.pdf21.44 MBAdobe PDFThumbnail
Preview File