Coverart for item
The Resource Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers, Pil Joong Lee, Jung Hee Cheon (Eds.)

Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers, Pil Joong Lee, Jung Hee Cheon (Eds.)

Label
Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers
Title
Information security and cryptology - ICISC 2008
Title remainder
11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers
Statement of responsibility
Pil Joong Lee, Jung Hee Cheon (Eds.)
Title variation
ICISC 2008
Creator
Contributor
Subject
Genre
Language
eng
Summary
Annotation
Member of
Is part of
Cataloging source
GW5XE
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
I25 2009
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2008
http://bibfra.me/vocab/lite/meetingName
ICISC (Conference)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Lee, Pil Joong
  • Cheon, Jung Hee
Series statement
Lecture notes in computer science
Series volume
5461
http://library.link/vocab/subjectName
  • Computer security
  • Data encryption (Computer science)
  • Computer networks
  • Data encryption (Computer science)
  • Computer networks
  • Computer security
  • Informatique
  • Computer networks
  • Computer security
  • Data encryption (Computer science)
  • Authentifikation
  • Chiffrierung
  • Computersicherheit
  • Datensicherung
  • Digital Rights Management
  • Kryptoanalyse
  • Kryptologie
  • Privatsphäre
  • Rechnernetz
Summary expansion
This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers
Label
Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers, Pil Joong Lee, Jung Hee Cheon (Eds.)
Instantiates
Publication
Note
Includes index
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Public key encryption -- Key management and secret sharing -- Privacy and digital rights -- Digital signature and voting -- Side channel attack -- Hash and MAC -- Primitives and foundations -- Block and stream
Control code
341591167
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783642007293
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-00730-9
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-00729-3
Specific material designation
remote
System control number
(OCoLC)341591167
Label
Information security and cryptology - ICISC 2008 : 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised selected papers, Pil Joong Lee, Jung Hee Cheon (Eds.)
Publication
Note
Includes index
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Public key encryption -- Key management and secret sharing -- Privacy and digital rights -- Digital signature and voting -- Side channel attack -- Hash and MAC -- Primitives and foundations -- Block and stream
Control code
341591167
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9783642007293
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-00730-9
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-00729-3
Specific material designation
remote
System control number
(OCoLC)341591167

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...