| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910349394103321 |
|
|
Titolo |
Cryptology and Network Security : 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers / / edited by Srdjan Capkun, Sherman S. M. Chow |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2018.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVII, 548 p. 123 illus., 51 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 11261 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Software engineering |
Data mining |
Application software |
Computers and civilization |
Cryptology |
Software Engineering |
Data Mining and Knowledge Discovery |
Computer and Information Systems Applications |
Computers and Society |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Foundation of Applied Cryptography -- Processing Encrypted Data -- Predicate Encryption -- Credentials and Authentication -- Web Security -- Bitcoin and Blockchain -- Embedded System Security -- Anonymous and Virtual Private Networks -- Wireless and Physical Layer Security -- Short Papers. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. |
|
|
|
|
|
|
|
|
|
|
The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security. |
|
|
|
|
|
| |