Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptology and network security15th ...
~
(1998 :)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cryptology and network securityedited by Sara Foresti, Giuseppe Persiano.
Reminder of title:
15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
remainder title:
CANS 2016
other author:
Foresti, Sara.
corporate name:
Published:
Cham :Springer International Publishing :2016.
Description:
xvi, 762 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science)
Online resource:
http://dx.doi.org/10.1007/978-3-319-48965-0
ISBN:
9783319489650$q(electronic bk.)
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
Cryptology and network security
15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /[electronic resource] :CANS 2016edited by Sara Foresti, Giuseppe Persiano. - Cham :Springer International Publishing :2016. - xvi, 762 p. :ill., digital ;24 cm. - Lecture notes in computer science,100520302-9743 ;. - Lecture notes in computer science ;4891..
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
ISBN: 9783319489650$q(electronic bk.)
Standard No.: 10.1007/978-3-319-48965-0doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Cryptology and network security15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
LDR
:01898nmm a2200325 a 4500
001
498279
003
DE-He213
005
20161027180810.0
006
m d
007
cr nn 008maaau
008
170511s2016 gw s 0 eng d
020
$a
9783319489650$q(electronic bk.)
020
$a
9783319489643$q(paper)
024
7
$a
10.1007/978-3-319-48965-0
$2
doi
035
$a
978-3-319-48965-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
I61 2016
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Cryptology and network security
$h
[electronic resource] :
$b
15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016 : proceedings /
$c
edited by Sara Foresti, Giuseppe Persiano.
246
3
$a
CANS 2016
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xvi, 762 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
10052
520
$a
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Computer science.
$3
199325
650
0
$a
Computer networks.
$3
181923
650
0
$a
Computer security.
$3
184416
650
0
$a
Coding theory.
$3
184605
650
0
$a
Management information systems.
$3
199355
650
2 4
$a
Data Encryption.
$3
273765
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Computer Communication Networks.
$3
218087
650
2 4
$a
Coding and Information Theory.
$3
273763
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
700
1
$a
Foresti, Sara.
$3
489426
700
1
$a
Persiano, Giuseppe.
$3
279049
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-48965-0
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000133714
電子館藏
1圖書
電子書
EB QA76.9.A25 I61 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-48965-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login