LEADER 03565nam 22007095 450 001 9910483506903321 005 20200701101200.0 010 $a3-319-10879-4 024 7 $a10.1007/978-3-319-10879-7 035 $a(CKB)3710000000227394 035 $a(SSID)ssj0001338848 035 $a(PQKBManifestationID)11748746 035 $a(PQKBTitleCode)TC0001338848 035 $a(PQKBWorkID)11345544 035 $a(PQKB)10296793 035 $a(DE-He213)978-3-319-10879-7 035 $a(MiAaPQ)EBC6287783 035 $a(MiAaPQ)EBC5596005 035 $a(Au-PeEL)EBL5596005 035 $a(OCoLC)889880381 035 $a(PPN)180626426 035 $a(EXLCZ)993710000000227394 100 $a20140821d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and Cryptography for Networks $e9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings /$fedited by Michel Abdalla, Roberto De Prisco 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XX, 609 p. 101 illus.) 225 1 $aSecurity and Cryptology ;$v8642 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-10878-6 327 $aKey exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption. 330 $aThis book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption. 410 0$aSecurity and Cryptology ;$v8642 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aAbdalla$b Michel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDe Prisco$b Roberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483506903321 996 $aSecurity and Cryptography for Networks$92912219 997 $aUNINA