Ditemukan 4 dokumen yang sesuai dengan query
"
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.
The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security ...
"
Berlin: [;Springer-Verlag, Springer-Verlag], 2012
e20408684
eBooks Universitas Indonesia Library
Sara Foresti, editor
"
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems, formal models for cryptography and access control, security and privacy in mobile and wireless networks, counteracting man-in-the-middle attacks, network security, users privacy ...
"
Berlin: [Springer-Verlag, ], 2012
e20410002
eBooks Universitas Indonesia Library
"
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications ...
"
Heidelberg : Springer, 2012
e20406883
eBooks Universitas Indonesia Library
"
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections ...
"
Berlin : Springer-Verlag, 2012
e20410066
eBooks Universitas Indonesia Library