000 | 03610nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-319-93387-0 | ||
003 | DE-He213 | ||
005 | 20240730181958.0 | ||
007 | cr nn 008mamaa | ||
008 | 180609s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319933870 _9978-3-319-93387-0 |
||
024 | 7 |
_a10.1007/978-3-319-93387-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aApplied Cryptography and Network Security _h[electronic resource] : _b16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / _cedited by Bart Preneel, Frederik Vercauteren. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXIV, 716 p. 135 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10892 |
|
505 | 0 | _aCryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. | |
520 | _aThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aApplication software. _9126837 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aCoding and Information Theory. _9126838 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9126839 |
700 | 1 |
_aPreneel, Bart. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9126840 |
|
700 | 1 |
_aVercauteren, Frederik. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9126841 |
|
710 | 2 |
_aSpringerLink (Online service) _9126842 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319933863 |
776 | 0 | 8 |
_iPrinted edition: _z9783319933887 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10892 _9126843 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-93387-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91169 _d91169 |