04016nam 22007935 450 991048362120332120200701013632.03-319-39555-610.1007/978-3-319-39555-5(CKB)3710000000734799(DE-He213)978-3-319-39555-5(MiAaPQ)EBC6306808(MiAaPQ)EBC5595650(Au-PeEL)EBL5595650(OCoLC)951807257(PPN)194378349(EXLCZ)99371000000073479920160608d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierApplied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XIV, 668 p. 110 illus.) Security and Cryptology ;96963-319-39554-8 Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. .Security and Cryptology ;9696Computer securityData encryption (Computer science)Computer communication systemsManagement information systemsComputer scienceComputersComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer security.Data encryption (Computer science).Computer communication systems.Management information systems.Computer science.Computers.Computers and civilization.Systems and Data Security.Cryptology.Computer Communication Networks.Management of Computing and Information Systems.Theory of Computation.Computers and Society.005.82Manulis Markedthttp://id.loc.gov/vocabulary/relators/edtSadeghi Ahmad-Rezaedthttp://id.loc.gov/vocabulary/relators/edtSchneider Steveedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483621203321Applied Cryptography and Network Security771881UNINA