000712004 000__ 02730cam\a2200481Ii\4500 000712004 001__ 712004 000712004 005__ 20230306140221.0 000712004 006__ m\\\\\o\\d\\\\\\\\ 000712004 007__ cr\cn\nnnunnun 000712004 008__ 141105s2014\\\\sz\a\\\\o\\\\\101\0\eng\d 000712004 020__ $$a9783319121604$$qelectronic book 000712004 020__ $$a331912160X$$qelectronic book 000712004 020__ $$z9783319121598 000712004 0247_ $$a10.1007/978-3-319-12160-4$$2doi 000712004 035__ $$aSP(OCoLC)ocn894504208 000712004 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dUKMGB$$dUPM 000712004 049__ $$aISEA 000712004 050_4 $$aQA76.9.A25 000712004 08204 $$a005.8$$223 000712004 1112_ $$aICISC (Conference)$$n(16th :$$d2013 :$$cSeoul, Korea) 000712004 24510 $$aInformation security and cryptology -- ICISC 2013$$h[electronic resource] :$$b16th International Conference, Seoul, Korea, November 27-29, 2013, Revised selected papers /$$cHyang-Sook Lee, Dong-Guk Han (ed.). 000712004 2463_ $$aICISC 2013 000712004 264_1 $$aCham :$$bSpringer,$$c2014. 000712004 300__ $$a1 online resource (xiii, 538 pages) :$$billustrations. 000712004 336__ $$atext$$btxt$$2rdacontent 000712004 337__ $$acomputer$$bc$$2rdamedia 000712004 338__ $$aonline resource$$bcr$$2rdacarrier 000712004 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v8565 000712004 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000712004 500__ $$aIncludes author index. 000712004 506__ $$aAccess limited to authorized users. 000712004 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography. 000712004 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 5, 2014). 000712004 650_0 $$aComputer security$$vCongresses. 000712004 650_0 $$aData encryption (Computer science)$$vCongresses. 000712004 7001_ $$aLee, Hyang-Sook,$$eeditor. 000712004 7001_ $$aHan, Dong-Guk,$$eeditor. 000712004 830_0 $$aLecture notes in computer science ;$$v8565. 000712004 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000712004 85280 $$bebk$$hSpringerLink 000712004 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-12160-4$$zOnline Access 000712004 909CO $$ooai:library.usi.edu:712004$$pGLOBAL_SET 000712004 980__ $$aEBOOK 000712004 980__ $$aBIB 000712004 982__ $$aEbook 000712004 983__ $$aOnline 000712004 994__ $$a92$$bISE