|
|
|
|
LEADER |
03801nam a22006375i 4500 |
001 |
978-3-319-39555-5 |
003 |
DE-He213 |
005 |
20210625000338.0 |
007 |
cr nn 008mamaa |
008 |
160608s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319395555
|9 978-3-319-39555-5
|
024 |
7 |
|
|a 10.1007/978-3-319-39555-5
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applied Cryptography and Network Security
|h [electronic resource] :
|b 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /
|c edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIV, 668 p. 110 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9696
|
505 |
0 |
|
|a Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. .
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24067
|
650 |
2 |
4 |
|a Theory of Computation.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I16005
|
650 |
2 |
4 |
|a Computers and Society.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I24040
|
700 |
1 |
|
|a Manulis, Mark.
|e editor.
|0 (orcid)0000-0002-1512-9670
|1 https://orcid.org/0000-0002-1512-9670
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Sadeghi, Ahmad-Reza.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schneider, Steve.
|e editor.
|0 (orcid)0000-0001-8365-6993
|1 https://orcid.org/0000-0001-8365-6993
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319395548
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319395562
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9696
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-39555-5
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|