04079nam 22008175 450 99646575010331620200704030430.03-642-31284-510.1007/978-3-642-31284-7(CKB)3400000000085353(SSID)ssj0000697444(PQKBManifestationID)11481601(PQKBTitleCode)TC0000697444(PQKBWorkID)10691991(PQKB)11657139(DE-He213)978-3-642-31284-7(MiAaPQ)EBC3070860(PPN)168319012(EXLCZ)99340000000008535320120613d2012 u| 0engurnn#008mamaatxtccrApplied Cryptography and Network Security[electronic resource] 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings /edited by Feng Bao, Pierangela Samarati, Jianying Zhou1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XIV, 580 p. 107 illus.)Security and Cryptology ;7341Bibliographic Level Mode of Issuance: Monograph3-642-31283-7 Includes bibliographical references and index.This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.Security and Cryptology ;7341Computer securityData encryption (Computer science)Management information systemsComputer scienceComputer communication systemsCoding theoryInformation theoryData structures (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Data Structureshttps://scigraph.springernature.com/ontologies/product-market-codes/I15017Computer security.Data encryption (Computer science).Management information systems.Computer science.Computer communication systems.Coding theory.Information theory.Data structures (Computer science).Systems and Data Security.Cryptology.Management of Computing and Information Systems.Computer Communication Networks.Coding and Information Theory.Data Structures.005.8Bao Fengedthttp://id.loc.gov/vocabulary/relators/edtSamarati Pierangelaedthttp://id.loc.gov/vocabulary/relators/edtZhou Jianyingedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465750103316Applied Cryptography and Network Security771881UNISA