Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings / [electronic resource] :
edited by Vassilis Zikas, Roberto De Prisco.
- 1st ed. 2016.
- XIX, 606 p. 75 illus. online resource.
- Security and Cryptology, 9841 2946-1863 ; .
- Security and Cryptology, 9841 .
Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
9783319446189
10.1007/978-3-319-44618-9 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Computer networks .
Cryptology.
Data and Information Security.
IT Operations.
Computer Communication Networks.
QA268
005.824
Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
9783319446189
10.1007/978-3-319-44618-9 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic data processing--Management.
Computer networks .
Cryptology.
Data and Information Security.
IT Operations.
Computer Communication Networks.
QA268
005.824