LEADER 04048nam 22008535 450 001 996213648203316 005 20200702045219.0 010 $a3-319-12280-0 024 7 $a10.1007/978-3-319-12280-9 035 $a(CKB)3710000000269697 035 $a(SSID)ssj0001372580 035 $a(PQKBManifestationID)11780203 035 $a(PQKBTitleCode)TC0001372580 035 $a(PQKBWorkID)11305030 035 $a(PQKB)10912017 035 $a(DE-He213)978-3-319-12280-9 035 $a(MiAaPQ)EBC6298891 035 $a(MiAaPQ)EBC5587583 035 $a(Au-PeEL)EBL5587583 035 $a(OCoLC)894505177 035 $a(PPN)18209782X 035 $a(EXLCZ)993710000000269697 100 $a20141017d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security$b[electronic resource] $e13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings /$fedited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 401 p. 52 illus.) 225 1 $aSecurity and Cryptology ;$v8813 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-12279-7 320 $aIncludes bibliographical references and index. 327 $aEncryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types of network protocol design -- Analysis work. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work. 410 0$aSecurity and Cryptology ;$v8813 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputer communication systems 606 $aCoding theory 606 $aInformation theory 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aGritzalis$b Dimitris$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKiayias$b Aggelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAskoxylakis$b Ioannis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996213648203316 996 $aCryptology and Network Security$9772198 997 $aUNISA