Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/812
Full metadata record
DC FieldValueLanguage
dc.contributor.authorInomata, Atsuo. ;en_US
dc.contributor.authorYasuda, Kan. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:19Z-
dc.date.available2020-05-17T08:22:19Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319979168 ;en_US
dc.identifier.isbn9783319979151 (print) ;en_US
dc.identifier.isbn9783319979175 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/812-
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319979151. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319979175. ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security. ;en_US
dc.description.statementofresponsibilityedited by Atsuo Inomata, Kan Yasuda.en_US
dc.description.tableofcontentsCryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret Sharing -- Symmetric-Key Primitives -- Provable Security. ;en_US
dc.format.extentXII, 331 p. 39 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11049. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11049. ;en_US
dc.relation.haspart9783319979151.pdfen_US
dc.subjectData protection. ;en_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectSystems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ;en_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.titleAdvances in Information and Computer Securityen_US
dc.title.alternative13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319979151.pdf10.41 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorInomata, Atsuo. ;en_US
dc.contributor.authorYasuda, Kan. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:19Z-
dc.date.available2020-05-17T08:22:19Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319979168 ;en_US
dc.identifier.isbn9783319979151 (print) ;en_US
dc.identifier.isbn9783319979175 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/812-
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319979151. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319979175. ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security. ;en_US
dc.description.statementofresponsibilityedited by Atsuo Inomata, Kan Yasuda.en_US
dc.description.tableofcontentsCryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret Sharing -- Symmetric-Key Primitives -- Provable Security. ;en_US
dc.format.extentXII, 331 p. 39 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11049. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11049. ;en_US
dc.relation.haspart9783319979151.pdfen_US
dc.subjectData protection. ;en_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectSystems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ;en_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.titleAdvances in Information and Computer Securityen_US
dc.title.alternative13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319979151.pdf10.41 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorInomata, Atsuo. ;en_US
dc.contributor.authorYasuda, Kan. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:19Z-
dc.date.available2020-05-17T08:22:19Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319979168 ;en_US
dc.identifier.isbn9783319979151 (print) ;en_US
dc.identifier.isbn9783319979175 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/812-
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319979151. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319979175. ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security. ;en_US
dc.description.statementofresponsibilityedited by Atsuo Inomata, Kan Yasuda.en_US
dc.description.tableofcontentsCryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret Sharing -- Symmetric-Key Primitives -- Provable Security. ;en_US
dc.format.extentXII, 331 p. 39 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11049. ;en_US
dc.relation.ispartofseriesSecurity and Cryptology ; ; 11049. ;en_US
dc.relation.haspart9783319979151.pdfen_US
dc.subjectData protection. ;en_US
dc.subjectData encryption (Computer scienc. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectSystems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ;en_US
dc.subjectData Encryption. ; http://scigraph.springernature.com/things/product-market-codes/I15033. ;en_US
dc.subjectComputer Communication Networksen_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.titleAdvances in Information and Computer Securityen_US
dc.title.alternative13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319979151.pdf10.41 MBAdobe PDFThumbnail
Preview File