00925cam0 2200289 450 E60020002330120180828123938.020061204d1983 |||||ita|0103 baitaITDantonil tribuno del popoloNorman Hampsontrad. Maria MagriniMilanoBompiani1983207 p.21 cm.Biografie Bompiani(da)001LAEC000230592001 *Biografie BompianiHampson, NormanA600200039563070210440Magrini, MariaA600200039564070ITUNISOB20180828RICAUNISOBUNISOB90036036E600200023301M 102 Monografia moderna SBNM900000924Si36036acquistopregresso2UNISOBUNISOB20061204093624.020180828123938.0AlfanoDanton1690963UNISOB03291nam 22007455 450 991048425350332120251226195050.03-319-48965-810.1007/978-3-319-48965-0(CKB)3710000000926188(DE-He213)978-3-319-48965-0(MiAaPQ)EBC6281325(MiAaPQ)EBC5577987(Au-PeEL)EBL5577987(OCoLC)962018297(PPN)196323517(EXLCZ)99371000000092618820161027d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierCryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings /edited by Sara Foresti, Giuseppe Persiano1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XVI, 762 p. 116 illus.) Security and Cryptology,2946-1863 ;100523-319-48964-X This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.Security and Cryptology,2946-1863 ;10052CryptographyData encryption (Computer science)Data protectionComputer networksCoding theoryInformation theoryElectronic data processingManagementCryptologyData and Information SecurityComputer Communication NetworksCoding and Information TheoryIT OperationsCryptography.Data encryption (Computer science).Data protection.Computer networks.Coding theory.Information theory.Electronic data processingManagement.Cryptology.Data and Information Security.Computer Communication Networks.Coding and Information Theory.IT Operations.005.82Foresti Saraedthttp://id.loc.gov/vocabulary/relators/edtPersiano Giuseppeedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484253503321Cryptology and Network Security2968064UNINA