04910nam 22008895 450 991048366040332120200704090938.03-319-28166-610.1007/978-3-319-28166-7(CKB)4340000000001267(SSID)ssj0001616631(PQKBManifestationID)16346669(PQKBTitleCode)TC0001616631(PQKBWorkID)14920937(PQKB)10420885(DE-He213)978-3-319-28166-7(MiAaPQ)EBC6303465(MiAaPQ)EBC5588198(Au-PeEL)EBL5588198(OCoLC)1066178047(PPN)191705438(EXLCZ)99434000000000126720160108d2015 u| 0engurnn#008mamaatxtccrApplied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers /edited by Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (XVIII, 698 p. 152 illus. in color.)Security and Cryptology ;9092Bibliographic Level Mode of Issuance: Monograph3-319-28165-8 Includes bibliographical references and index.Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.Security and Cryptology ;9092Computer securityData encryption (Computer science)Computer communication systemsManagement information systemsComputer scienceComputersComputers and civilizationSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer security.Data encryption (Computer science).Computer communication systems.Management information systems.Computer science.Computers.Computers and civilization.Systems and Data Security.Cryptology.Computer Communication Networks.Management of Computing and Information Systems.Theory of Computation.Computers and Society.005.82Malkin Taledthttp://id.loc.gov/vocabulary/relators/edtKolesnikov Vladimiredthttp://id.loc.gov/vocabulary/relators/edtLewko Allisonedthttp://id.loc.gov/vocabulary/relators/edtPolychronakis Michalisedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483660403321Applied Cryptography and Network Security771881UNINA