LEADER 01114nam a2200265 i 4500 001 991002738589707536 008 150331s2015 gw a b 001 0 eng d 020 $a9783110359923 035 $ab14224574-39ule_inst 040 $aBibl. Dip.le Aggr. Ingegneria Innovazione - Sez. Ingegneria Innovazione$beng 082 00$a005.1$223 245 00$aComputational technologies.$pA first course /$cedited by Petr N. Vabishchevich 260 $aBerlin ;$aBoston :$bde Gruyter,$cc2015 300 $axii, 236 p.:$bill. ;$c25 cm 440 0$aDe Gruyter textbook 504 $aIncludes bibliographical references and index 650 0$aMathematics$xData processing$vTextbooks 650 0$aComputer algorithms$vTextbooks 700 1 $aVabishchevich, Petr Nikolaevich 907 $a.b14224574$b27-04-15$c22-04-15 912 $a991002738589707536 945 $aLE026 005.1 VAB 01.01 2015$g1$i2026000069258$lle026$nProf. Zavarise / Biblioteca$op$pE37.34$q-$rl$s- $t4$u0$v0$w0$x0$y.i15669002$z27-04-15 996 $aComputational technologies$9256789 997 $aUNISALENTO 998 $ale026$b31-03-15$cm$da $e $feng$ggw $h0$i0 LEADER 03713nam 22007215 450 001 9910993931103321 005 20250410135724.0 010 $a3-031-87541-9 024 7 $a10.1007/978-3-031-87541-0 035 $a(CKB)38337798100041 035 $a(DE-He213)978-3-031-87541-0 035 $a(MiAaPQ)EBC32005817 035 $a(Au-PeEL)EBL32005817 035 $a(EXLCZ)9938337798100041 100 $a20250410d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity Standardisation Research $e9th International Conference, SSR 2024, Kunming, China, December 16, 2024, Proceedings /$fedited by Xianhui Lu, Chris J. Mitchell 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XI, 187 p. 37 illus., 16 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15559 311 08$a3-031-87540-0 327 $a -- Invited keynote talks. -- Standardisation of and Migration to Post-Quantum Cryptography. -- Contributed papers. -- The Vision of Multi-Party Computation Technical Standards. -- Vision Paper: Do we need Standardization of Blockchain Consensus?. .-Security and Privacy Evaluation of IP Cameras on Shodan. .-Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol. .-SoK: Post-Quantum Key Encapsulation Mechanisms - Security Definitions, Constructions and Applications. .-Scloud+: An Efficient LWE-based KEM Without Ring/Module Structure. .-Transitioning to Quantum Secure Encryption Schemes. 330 $aThis book constitutes the refereed proceedings of the 9th International Conference on Security Standardisation Research, SSR 2024, held in Kunming, China, during December 16, 2024. The 7 full papers included in this book were carefully reviewed and selected from 19 submissions. These papers focus on a wide range of topics within the field of Security standardization research. This book also includes the full paper from the invited keynote talk titled "Standardisation of and Migration to Post-Quantum Cryptography", given by Liqun Chen. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15559 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aApplication software 606 $aData and Information Security 606 $aCryptology 606 $aMobile and Network Security 606 $aSecurity Services 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aLu$b Xianhui$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMitchell$b Chris J$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910993931103321 996 $aSecurity standardisation research$92065770 997 $aUNINA