LEADER 03033nam 22007455 450 001 9910483471603321 005 20251226203255.0 010 $a3-319-26823-6 024 7 $a10.1007/978-3-319-26823-1 035 $a(CKB)4340000000001221 035 $a(SSID)ssj0001585004 035 $a(PQKBManifestationID)16265698 035 $a(PQKBTitleCode)TC0001585004 035 $a(PQKBWorkID)14865087 035 $a(PQKB)11527443 035 $a(DE-He213)978-3-319-26823-1 035 $a(MiAaPQ)EBC6285866 035 $a(MiAaPQ)EBC5587995 035 $a(Au-PeEL)EBL5587995 035 $a(OCoLC)932170404 035 $a(PPN)190529598 035 $a(EXLCZ)994340000000001221 100 $a20151119d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security $e14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings /$fedited by Michael Reiter, David Naccache 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (X, 257 p. 41 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9476 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-26822-8 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9476 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aReiter$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483471603321 996 $aCryptology and Network Security$92968064 997 $aUNINA