TY - BOOK ID - 7834497 TI - Information Security Practice and Experience : 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings AU - Deng, Robert H. AU - Feng, Tao. PY - 2013 SN - 3642380328 3642380336 PB - Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, DB - UniCat KW - Computer science. KW - Data protection. KW - Data encryption (Computer science). KW - Information Systems. KW - Computer Science. KW - Systems and Data Security. KW - Data Encryption. KW - Management of Computing and Information Systems. KW - Engineering & Applied Sciences KW - Computer Science KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Informatics KW - Computer security. KW - Management information systems. KW - Computer security KW - Computer networks KW - Data encryption (Computer science) KW - Security measures KW - Cryptology. KW - Cryptography KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Science KW - Computer-based information systems KW - EIS (Information systems) KW - Executive information systems KW - MIS (Information systems) KW - Sociotechnical systems KW - Information resources management KW - Management KW - Communication systems UR - https://www.unicat.be/uniCat?func=search&query=sysid:7834497 AB - This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice and Experience, ISPEC 2013, held in Lanzhou, China, in May 2013. The 27 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on network security; identity-based cryptography; cryptographic primitives; security protocols; system security; software security and DRM; and cryptanalysis and side channel attacks. ER -