Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/812
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Inomata, Atsuo. ; | en_US |
dc.contributor.author | Yasuda, Kan. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:19Z | - |
dc.date.available | 2020-05-17T08:22:19Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319979168 ; | en_US |
dc.identifier.isbn | 9783319979151 (print) ; | en_US |
dc.identifier.isbn | 9783319979175 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/812 | - |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319979151. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319979175. ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security. ; | en_US |
dc.description.statementofresponsibility | edited by Atsuo Inomata, Kan Yasuda. | en_US |
dc.description.tableofcontents | Cryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret Sharing -- Symmetric-Key Primitives -- Provable Security. ; | en_US |
dc.format.extent | XII, 331 p. 39 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11049. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11049. ; | en_US |
dc.relation.haspart | 9783319979151.pdf | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.title | Advances in Information and Computer Security | en_US |
dc.title.alternative | 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319979151.pdf | 10.41 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Inomata, Atsuo. ; | en_US |
dc.contributor.author | Yasuda, Kan. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:19Z | - |
dc.date.available | 2020-05-17T08:22:19Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319979168 ; | en_US |
dc.identifier.isbn | 9783319979151 (print) ; | en_US |
dc.identifier.isbn | 9783319979175 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/812 | - |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319979151. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319979175. ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security. ; | en_US |
dc.description.statementofresponsibility | edited by Atsuo Inomata, Kan Yasuda. | en_US |
dc.description.tableofcontents | Cryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret Sharing -- Symmetric-Key Primitives -- Provable Security. ; | en_US |
dc.format.extent | XII, 331 p. 39 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11049. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11049. ; | en_US |
dc.relation.haspart | 9783319979151.pdf | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.title | Advances in Information and Computer Security | en_US |
dc.title.alternative | 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319979151.pdf | 10.41 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Inomata, Atsuo. ; | en_US |
dc.contributor.author | Yasuda, Kan. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:19Z | - |
dc.date.available | 2020-05-17T08:22:19Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319979168 ; | en_US |
dc.identifier.isbn | 9783319979151 (print) ; | en_US |
dc.identifier.isbn | 9783319979175 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/812 | - |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319979151. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319979175. ; | en_US |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security. ; | en_US |
dc.description.statementofresponsibility | edited by Atsuo Inomata, Kan Yasuda. | en_US |
dc.description.tableofcontents | Cryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret Sharing -- Symmetric-Key Primitives -- Provable Security. ; | en_US |
dc.format.extent | XII, 331 p. 39 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11049. ; | en_US |
dc.relation.ispartofseries | Security and Cryptology ; ; 11049. ; | en_US |
dc.relation.haspart | 9783319979151.pdf | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Data encryption (Computer scienc. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Data Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ; | en_US |
dc.subject | Computer Communication Networks | en_US |
dc.subject | Artificial Intelligence and Robotics | en_US |
dc.title | Advances in Information and Computer Security | en_US |
dc.title.alternative | 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319979151.pdf | 10.41 MB | Adobe PDF | Preview File |