Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Manulis, Mark. (Editor, http://id.loc.gov/vocabulary/relators/edt), Sadeghi, Ahmad-Reza. (Editor, http://id.loc.gov/vocabulary/relators/edt), Schneider, Steve. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2016.
Edition:1st ed. 2016.
Series:Security and Cryptology ; 9696
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-39555-5
LEADER 03801nam a22006375i 4500
001 978-3-319-39555-5
003 DE-He213
005 20210625000338.0
007 cr nn 008mamaa
008 160608s2016 gw | s |||| 0|eng d
020 |a 9783319395555  |9 978-3-319-39555-5 
024 7 |a 10.1007/978-3-319-39555-5  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Applied Cryptography and Network Security  |h [electronic resource] :  |b 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /  |c edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider. 
250 |a 1st ed. 2016. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2016. 
300 |a XIV, 668 p. 110 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 9696 
505 0 |a Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use. 
520 |a This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. . 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer communication systems. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computers. 
650 0 |a Computers and civilization. 
650 1 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Cryptology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 
650 2 4 |a Computer Communication Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 
650 2 4 |a Management of Computing and Information Systems.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24067 
650 2 4 |a Theory of Computation.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I16005 
650 2 4 |a Computers and Society.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24040 
700 1 |a Manulis, Mark.  |e editor.  |0 (orcid)0000-0002-1512-9670  |1 https://orcid.org/0000-0002-1512-9670  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Sadeghi, Ahmad-Reza.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Schneider, Steve.  |e editor.  |0 (orcid)0000-0001-8365-6993  |1 https://orcid.org/0000-0001-8365-6993  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319395548 
776 0 8 |i Printed edition:  |z 9783319395562 
830 0 |a Security and Cryptology ;  |v 9696 
856 4 0 |u https://doi.org/10.1007/978-3-319-39555-5 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)