|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-39555-5 |
003 |
DE-He213 |
005 |
20220115065316.0 |
007 |
cr nn 008mamaa |
008 |
160608s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319395555
|9 978-3-319-39555-5
|
024 |
7 |
|
|a 10.1007/978-3-319-39555-5
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applied Cryptography and Network Security
|h [electronic resource] :
|b 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /
|c edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIV, 668 p. 110 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9696
|
505 |
0 |
|
|a Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
|
|a Manulis, Mark.
|e editor.
|0 (orcid)0000-0002-1512-9670
|1 https://orcid.org/0000-0002-1512-9670
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Sadeghi, Ahmad-Reza.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schneider, Steve.
|e editor.
|0 (orcid)0000-0001-8365-6993
|1 https://orcid.org/0000-0001-8365-6993
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319395548
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319395562
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9696
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-39555-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|