Coverart for item
The Resource Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings, Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.)

Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings, Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.)

Label
Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings
Title
Information security
Title remainder
17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings
Statement of responsibility
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.)
Title variation
ISC 2014
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security
Member of
Cataloging source
NLGGC
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2014
http://bibfra.me/vocab/lite/meetingName
ISC (Conference : Information security)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1964-
http://library.link/vocab/relatedWorkOrContributorName
  • Chow, Sherman S. M.
  • Camenisch, Jan
  • Hui, Lucas Chi-Kwong
  • Yiu, Siu Ming
Series statement
  • Lecture notes in computer science,
  • SL 4, Security and cryptology
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
8783.
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • Data encryption (Computer science)
  • Computer science
  • Software engineering
  • Computer software
  • Computer science
  • Computer security
  • Computer software
  • Data encryption (Computer science)
  • Data protection
  • Software engineering
Label
Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings, Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security
Control code
894571058
Extent
1 online resource (PDF, XVIII, 569 pages)
Form of item
online
Isbn
9783319132570
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-319-13257-0
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)894571058
Label
Information security : 17th international conference, ISC 2014, Hong Kong, China, October 12-14, 2014 : proceedings, Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Public-Key Encryption -- Authentication -- Symmetric Key Cryptography -- Zero-Knowledge Proofs and Arguments -- Outsourced and Multi-party Computations -- Implementation -- Information Leakage -- Firewall and Forensics -- Web Security -- Android Security
Control code
894571058
Extent
1 online resource (PDF, XVIII, 569 pages)
Form of item
online
Isbn
9783319132570
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-319-13257-0
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)894571058

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...