|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-10879-7 |
003 |
DE-He213 |
005 |
20220113033137.0 |
007 |
cr nn 008mamaa |
008 |
140821s2014 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319108797
|9 978-3-319-10879-7
|
024 |
7 |
|
|a 10.1007/978-3-319-10879-7
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Security and Cryptography for Networks
|h [electronic resource] :
|b 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings /
|c edited by Michel Abdalla, Roberto De Prisco.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XX, 609 p. 101 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8642
|
505 |
0 |
|
|a Key exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption.
|
520 |
|
|
|a This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Abdalla, Michel.
|e editor.
|0 (orcid)0000-0002-2447-4329
|1 https://orcid.org/0000-0002-2447-4329
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a De Prisco, Roberto.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319108803
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319108780
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8642
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-10879-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|