LEADER 04079nam 22008175 450 001 996465750103316 005 20200704030430.0 010 $a3-642-31284-5 024 7 $a10.1007/978-3-642-31284-7 035 $a(CKB)3400000000085353 035 $a(SSID)ssj0000697444 035 $a(PQKBManifestationID)11481601 035 $a(PQKBTitleCode)TC0000697444 035 $a(PQKBWorkID)10691991 035 $a(PQKB)11657139 035 $a(DE-He213)978-3-642-31284-7 035 $a(MiAaPQ)EBC3070860 035 $a(PPN)168319012 035 $a(EXLCZ)993400000000085353 100 $a20120613d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplied Cryptography and Network Security$b[electronic resource] $e10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings /$fedited by Feng Bao, Pierangela Samarati, Jianying Zhou 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XIV, 580 p. 107 illus.) 225 1 $aSecurity and Cryptology ;$v7341 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-31283-7 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids. 410 0$aSecurity and Cryptology ;$v7341 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aCoding theory 606 $aInformation theory 606 $aData structures (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aData Structures$3https://scigraph.springernature.com/ontologies/product-market-codes/I15017 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData structures (Computer science). 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aData Structures. 676 $a005.8 702 $aBao$b Feng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465750103316 996 $aApplied Cryptography and Network Security$9771881 997 $aUNISA