|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465790403316 |
|
|
Titolo |
Applied Cryptography and Network Security [[electronic resource] ] : 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / / edited by Bart Preneel, Frederik Vercauteren |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2018.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 716 p. 135 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10892 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Data encryption (Computer science) |
Coding theory |
Information theory |
Computers and civilization |
Computers |
Law and legislation |
Application software |
Systems and Data Security |
Cryptology |
Coding and Information Theory |
Computers and Society |
Legal Aspects of Computing |
Information Systems Applications (incl. Internet) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network |
|
|
|
|
|
|
|
|
|
|
Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. |
|
|
|
|
|
| |