LEADER 03586nam 22008535 450 001 9910483462803321 005 20251113191157.0 010 $a3-319-12280-0 024 7 $a10.1007/978-3-319-12280-9 035 $a(CKB)3710000000269697 035 $a(SSID)ssj0001372580 035 $a(PQKBManifestationID)11780203 035 $a(PQKBTitleCode)TC0001372580 035 $a(PQKBWorkID)11305030 035 $a(PQKB)10912017 035 $a(DE-He213)978-3-319-12280-9 035 $a(MiAaPQ)EBC6298891 035 $a(MiAaPQ)EBC5587583 035 $a(Au-PeEL)EBL5587583 035 $a(OCoLC)894505177 035 $a(PPN)18209782X 035 $a(EXLCZ)993710000000269697 100 $a20141017d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings /$fedited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 401 p. 52 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8813 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-12279-7 320 $aIncludes bibliographical references and index. 327 $aEncryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8813 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aElectronic data processing$xManagement 606 $aCryptology 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aIT Operations 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aElectronic data processing$xManagement. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aIT Operations. 676 $a005.82 702 $aGritzalis$b Dimitris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKiayias$b Aggelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAskoxylakis$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483462803321 996 $aCryptology and Network Security$92968064 997 $aUNINA