LEADER 03029nam 22006495 450 001 9910483297303321 005 20251226193517.0 010 $a3-319-07536-5 024 7 $a10.1007/978-3-319-07536-5 035 $a(CKB)3710000000143845 035 $a(SSID)ssj0001274637 035 $a(PQKBManifestationID)11858394 035 $a(PQKBTitleCode)TC0001274637 035 $a(PQKBWorkID)11333307 035 $a(PQKB)10408935 035 $a(DE-He213)978-3-319-07536-5 035 $a(MiAaPQ)EBC3093206 035 $a(PPN)179766163 035 $a(EXLCZ)993710000000143845 100 $a20140604d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security $e12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings /$fedited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVIII, 586 p. 127 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8479 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-07535-7 327 $aKey exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8479 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science 606 $aData and Information Security 606 $aCryptology 606 $aTheory of Computation 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aTheory of Computation. 676 $a005.8 702 $aBoureanu$b Ioana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOwesarski$b Philippe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVaudenay$b Serge$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910483297303321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA