Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptology and network security = 15...
~
SpringerLink (Online service)
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cryptology and network security/ edited by Sara Foresti, Giuseppe Persiano.
Reminder of title:
15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
remainder title:
CANS 2016
other author:
Foresti, Sara.
corporate name:
Workshop on the Preservation of Stability under Discretization
Published:
Cham :Springer International Publishing : : 2016.,
Description:
xvi, 762 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science) -
Online resource:
http://dx.doi.org/10.1007/978-3-319-48965-0
ISBN:
9783319489650
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
Cryptology and network security
15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /[electronic resource] :CANS 2016edited by Sara Foresti, Giuseppe Persiano. - Cham :Springer International Publishing :2016. - xvi, 762 p. :ill., digital ;24 cm. - Lecture notes in computer science,100520302-9743 ;. - Lecture notes in computer science ;6140..
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
ISBN: 9783319489650
Standard No.: 10.1007/978-3-319-48965-0doiSubjects--Topical Terms:
658943
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Cryptology and network security = 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
LDR
:01898nam a2200325 a 4500
001
867618
003
DE-He213
005
20161027180810.0
006
m d
007
cr nn 008maaau
008
170720s2016 gw s 0 eng d
020
$a
9783319489650
$q
(electronic bk.)
020
$a
9783319489643
$q
(paper)
024
7
$a
10.1007/978-3-319-48965-0
$2
doi
035
$a
978-3-319-48965-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
I61 2016
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Cryptology and network security
$h
[electronic resource] :
$b
15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
$c
edited by Sara Foresti, Giuseppe Persiano.
246
3
$a
CANS 2016
260
$a
Cham :
$c
2016.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xvi, 762 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
10052
520
$a
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
650
0
$a
Data encryption (Computer science)
$3
658943
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
0
$a
Computer science.
$3
573171
650
0
$a
Computer networks.
$3
528577
650
0
$a
Computer security.
$3
557122
650
0
$a
Coding theory.
$3
561460
650
0
$a
Management information systems.
$3
561123
650
2 4
$a
Data Encryption.
$3
669790
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Coding and Information Theory.
$3
669784
650
2 4
$a
Management of Computing and Information Systems.
$3
593928
700
1
$a
Foresti, Sara.
$3
782248
700
1
$a
Persiano, Giuseppe.
$3
674691
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
6140.
$3
744199
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-48965-0
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login