03516nam 22007935 450 991048362120332120251226195928.03-319-39555-610.1007/978-3-319-39555-5(CKB)3710000000734799(DE-He213)978-3-319-39555-5(MiAaPQ)EBC6306808(MiAaPQ)EBC5595650(Au-PeEL)EBL5595650(OCoLC)951807257(PPN)194378349(EXLCZ)99371000000073479920160608d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierApplied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XIV, 668 p. 110 illus.) Security and Cryptology,2946-1863 ;96963-319-39554-8 Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. .Security and Cryptology,2946-1863 ;9696Data protectionCryptographyData encryption (Computer science)Computer networksElectronic data processingManagementComputer scienceComputers and civilizationData and Information SecurityCryptologyComputer Communication NetworksIT OperationsTheory of ComputationComputers and SocietyData protection.Cryptography.Data encryption (Computer science).Computer networks.Electronic data processingManagement.Computer science.Computers and civilization.Data and Information Security.Cryptology.Computer Communication Networks.IT Operations.Theory of Computation.Computers and Society.005.82Manulis Markedthttp://id.loc.gov/vocabulary/relators/edtSadeghi Ahmad-Rezaedthttp://id.loc.gov/vocabulary/relators/edtSchneider Steveedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483621203321Applied Cryptography and Network Security771881UNINA