Normal view MARC view ISBD view

Pairing-Based Cryptography - Pairing 2013 [electronic resource] : 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers / edited by Zhenfu Cao, Fangguo Zhang.

Contributor(s): Cao, Zhenfu [editor.] | Zhang, Fangguo [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 8365Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Description: X, 251 p. 10 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319048734.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Coding theory | Computers | Computer Science | Data Encryption | Systems and Data Security | Coding and Information Theory | Theory of ComputationAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.

There are no comments for this item.

Log in to your account to post a comment.