Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/2666
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Xiaofeng, ; editor. ; | en_US |
dc.contributor.author | Lin, Dongdai, ; editor. ; | en_US |
dc.contributor.author | Yung, Moti, ; editor. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:39:41Z | - |
dc.date.available | 2020-05-17T08:39:41Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319751603 ; 978-3-319-75160-3 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2666 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | 42 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319751597 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. ; | en_US |
dc.description.statementofresponsibility | edited by Xiaofeng Chen, Dongdai Lin, Moti Yung. | en_US |
dc.format.extent | XXI, 530 pages 84 illustrations : ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10726 ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science. ; 0302-9743 ; ; 10726. ; | en_US |
dc.relation.haspart | 9783319751603.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.title | Information Security and Cryptology | en_US |
dc.title.alternative | 13th International Conference, Inscrypt 2017, Xi'an, China, November 3ee5, 2017, Revised Selected Papers / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319751603.pdf | 21.44 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Xiaofeng, ; editor. ; | en_US |
dc.contributor.author | Lin, Dongdai, ; editor. ; | en_US |
dc.contributor.author | Yung, Moti, ; editor. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:39:41Z | - |
dc.date.available | 2020-05-17T08:39:41Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319751603 ; 978-3-319-75160-3 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2666 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | 42 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319751597 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. ; | en_US |
dc.description.statementofresponsibility | edited by Xiaofeng Chen, Dongdai Lin, Moti Yung. | en_US |
dc.format.extent | XXI, 530 pages 84 illustrations : ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10726 ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science. ; 0302-9743 ; ; 10726. ; | en_US |
dc.relation.haspart | 9783319751603.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.title | Information Security and Cryptology | en_US |
dc.title.alternative | 13th International Conference, Inscrypt 2017, Xi'an, China, November 3ee5, 2017, Revised Selected Papers / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319751603.pdf | 21.44 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Xiaofeng, ; editor. ; | en_US |
dc.contributor.author | Lin, Dongdai, ; editor. ; | en_US |
dc.contributor.author | Yung, Moti, ; editor. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:39:41Z | - |
dc.date.available | 2020-05-17T08:39:41Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319751603 ; 978-3-319-75160-3 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/2666 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | 42 ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319751597 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, Inscrypt 2017, held in Xi'an, China, in November 2017. The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digital signatures; encryption; cryptanalysis and attack; and applications. ; | en_US |
dc.description.statementofresponsibility | edited by Xiaofeng Chen, Dongdai Lin, Moti Yung. | en_US |
dc.format.extent | XXI, 530 pages 84 illustrations : ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10726 ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science. ; 0302-9743 ; ; 10726. ; | en_US |
dc.relation.haspart | 9783319751603.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science) ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Data Mining | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.title | Information Security and Cryptology | en_US |
dc.title.alternative | 13th International Conference, Inscrypt 2017, Xi'an, China, November 3ee5, 2017, Revised Selected Papers / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319751603.pdf | 21.44 MB | Adobe PDF | Preview File |