Cryptology and Network Security [electronic resource] : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / edited by Sara Foresti, Giuseppe Persiano.
Contributor(s): Foresti, Sara [editor.] | Persiano, Giuseppe [editor.] | SpringerLink (Online service).
Material type: BookSeries: Lecture Notes in Computer Science: 10052Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Description: XVI, 762 p. 116 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319489650.Subject(s): Computer science | Computer communication systems | Computer security | Data encryption (Computer science) | Coding theory | Management information systems | Computer Science | Data Encryption | Systems and Data Security | Computer Communication Networks | Coding and Information Theory | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
There are no comments for this item.