LEADER 03747nam 22006735 450 001 996466281303316 005 20200630075856.0 010 $a3-030-02641-8 024 7 $a10.1007/978-3-030-02641-7 035 $a(CKB)4100000007127510 035 $a(DE-He213)978-3-030-02641-7 035 $a(MiAaPQ)EBC6300880 035 $a(PPN)232470553 035 $a(EXLCZ)994100000007127510 100 $a20181109d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptology and Network Security$b[electronic resource] $e16th International Conference, CANS 2017, Hong Kong, China, November 30?December 2, 2017, Revised Selected Papers /$fedited by Srdjan Capkun, Sherman S. M. Chow 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XVII, 548 p. 123 illus., 51 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11261 311 $a3-030-02640-X 327 $aFoundation of Applied Cryptography -- Processing Encrypted Data -- Predicate Encryption -- Credentials and Authentication -- Web Security -- Bitcoin and Blockchain -- Embedded System Security -- Anonymous and Virtual Private Networks -- Wireless and Physical Layer Security -- Short Papers. 330 $aThis book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security. 410 0$aSecurity and Cryptology ;$v11261 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aData mining 606 $aApplication software 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aData mining. 615 0$aApplication software. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aData Mining and Knowledge Discovery. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputers and Society. 676 $a005.8 702 $aCapkun$b Srdjan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChow$b Sherman S. M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466281303316 996 $aCryptology and Network Security$9772198 997 $aUNISA