03155nam 22006255 450 991048329730332120200706104808.03-319-07536-510.1007/978-3-319-07536-5(CKB)3710000000143845(SSID)ssj0001274637(PQKBManifestationID)11858394(PQKBTitleCode)TC0001274637(PQKBWorkID)11333307(PQKB)10408935(DE-He213)978-3-319-07536-5(MiAaPQ)EBC3093206(PPN)179766163(EXLCZ)99371000000014384520140604d2014 u| 0engurnn#008mamaatxtccrApplied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings /edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XVIII, 586 p. 127 illus.)Security and Cryptology ;8479Bibliographic Level Mode of Issuance: Monograph3-319-07535-7 Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation.This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.Security and Cryptology ;8479Computer securityData encryption (Computer science)ComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Computer security.Data encryption (Computer science)Computers.Systems and Data Security.Cryptology.Theory of Computation.005.8Boureanu Ioanaedthttp://id.loc.gov/vocabulary/relators/edtOwesarski Philippeedthttp://id.loc.gov/vocabulary/relators/edtVaudenay Sergeedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910483297303321Applied Cryptography and Network Security771881UNINA