|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-02937-5 |
003 |
DE-He213 |
005 |
20220115060127.0 |
007 |
cr nn 008mamaa |
008 |
131030s2013 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319029375
|9 978-3-319-02937-5
|
024 |
7 |
|
|a 10.1007/978-3-319-02937-5
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Cryptology and Network Security
|h [electronic resource] :
|b 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings /
|c edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XVIII, 349 p. 52 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8257
|
505 |
0 |
|
|a Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. .
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
700 |
1 |
|
|a Abdalla, Michel.
|e editor.
|0 (orcid)0000-0002-2447-4329
|1 https://orcid.org/0000-0002-2447-4329
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Nita-Rotaru, Cristina.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Dahab, Ricardo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319029382
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319029368
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8257
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-02937-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|