Normal view MARC view ISBD view

Security and Cryptography for Networks [electronic resource] : 13th International Conference, SCN 2022, Amalfi (SA), Italy, September 12-14, 2022, Proceedings / edited by Clemente Galdi, Stanislaw Jarecki.

Contributor(s): Galdi, Clemente [editor.] | Jarecki, Stanislaw [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 13409Publisher: Cham : Springer International Publishing : Imprint: Springer, 2022Edition: 1st ed. 2022.Description: XXI, 786 p. 166 illus., 55 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031147913.Subject(s): Cryptography | Data encryption (Computer science) | Application software | Data protection | Computer networks -- Security measures | Computer networks  | Cryptology | Computer and Information Systems Applications | Security Services | Mobile and Network Security | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022. The 33 full papers presented in this volume were carefully reviewed and selected from 101 submissions. They are organized in topical sections: Ciphers, Cryptanalysis, Defenses; Public Key Encryption; Authentication and Signatures, Multiparty Computation; Zero-Knowledge Proofs and Applications.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the proceedings of the 13th International Conference on Security and Cryptography for Networks, SCN 2022, held in Amalfi, Italy, in September 2022. The 33 full papers presented in this volume were carefully reviewed and selected from 101 submissions. They are organized in topical sections: Ciphers, Cryptanalysis, Defenses; Public Key Encryption; Authentication and Signatures, Multiparty Computation; Zero-Knowledge Proofs and Applications.

There are no comments for this item.

Log in to your account to post a comment.