LEADER 03419nam 22007455 450 001 996466218203316 005 20200630081902.0 010 $a3-319-26823-6 024 7 $a10.1007/978-3-319-26823-1 035 $a(CKB)4340000000001221 035 $a(SSID)ssj0001585004 035 $a(PQKBManifestationID)16265698 035 $a(PQKBTitleCode)TC0001585004 035 $a(PQKBWorkID)14865087 035 $a(PQKB)11527443 035 $a(DE-He213)978-3-319-26823-1 035 $a(MiAaPQ)EBC6285866 035 $a(MiAaPQ)EBC5587995 035 $a(Au-PeEL)EBL5587995 035 $a(OCoLC)932170404 035 $a(PPN)190529598 035 $a(EXLCZ)994340000000001221 100 $a20151119d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptology and Network Security$b[electronic resource] $e14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings /$fedited by Michael Reiter, David Naccache 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (X, 257 p. 41 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9476 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-26822-8 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs. 410 0$aSecurity and Cryptology ;$v9476 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aReiter$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNaccache$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466218203316 996 $aCryptology and Network Security$9772198 997 $aUNISA