Search from the table of contents of 2.5 million books
Advanced Search (Beta)
Home > Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings

Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings


Book Informaton

Information Security: 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings

Author

Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie (auth.), Xuejia Lai, Jianying Zhou, Hui Li (eds.)

Series

Lecture Notes in Computer Science 7001

Year of Publication

2011

Publisher

Springer-Verlag Berlin Heidelberg

City of Publication

Berlin, Heidelberg

Language

en

ISBN

3642248608, 9783642248603, 9783642248610

ARI Id

1672473184886


Find on

World Cat

OpenLibrary

Internet Archive


This page has been accessed 3 times.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Citation Options
Download Citation

Showing 1 to 20 of 26 entries
Chapters/HeadingsAuthor(s)PagesInfo
Replacement Attacks on Behavior Based Software Birthma
Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decode
How to Find Short RC4 Colliding Key Pai
A Formal Approach to Distance-Bounding RFID Protoco
MASHA – Low Cost Authentication with a New Stream Ciph
Toward Pairing-Free Certificateless Authenticated Key Exchang
Security Analysis of an RSA Key Generation Algorithm with a Large Private K
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encrypti
The n -Diffie-Hellman Problem and Its Applicatio
RatBot: Anti-enume rat ion Peer-to-Peer Botne
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hash
Multi-stage Binary Code Obfuscation Using Improved Virtual Machi
Detection and Analysis of Cryptographic Data Inside Softwa
SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platfor
Hello rootKitty: A Lightweight Invariance-Enforcing Framewo
Opacity Analysis in Trust Management Syste
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constrain
Round-Efficient Oblivious Database Manipulati
A Privacy-Preserving Join on Outsourced Databa
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networ
Chapters/HeadingsAuthor(s)PagesInfo
Showing 1 to 20 of 26 entries