|
|
|
|
LEADER |
03675nam a2200589 4500 |
001 |
978-3-030-05378-9 |
003 |
DE-He213 |
005 |
20191027122948.0 |
007 |
cr nn 008mamaa |
008 |
181205s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030053789
|9 978-3-030-05378-9
|
024 |
7 |
|
|a 10.1007/978-3-030-05378-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Progress in Cryptology - INDOCRYPT 2018
|h [electronic resource] :
|b 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings /
|c edited by Debrup Chakraborty, Tetsu Iwata.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XXI, 399 p. 54 illus., 13 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11356
|
505 |
0 |
|
|a Outsourced Computation and Searchable Encryption -- Symmetric Key Cryptography and Format Preserving Encryption -- Fault Attacks and Hash Functions -- Post Quantum Cryptography -- Asymmetric Key Cryptography and Cryptanalysis -- Symmetric Key Cryptanalysis -- Theory -- Secure Computations and Protocols.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Security Services.
|0 http://scigraph.springernature.com/things/product-market-codes/I28030
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|0 http://scigraph.springernature.com/things/product-market-codes/I18030
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15009
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
700 |
1 |
|
|a Chakraborty, Debrup.
|e editor.
|0 (orcid)0000-0001-5179-1971
|1 https://orcid.org/0000-0001-5179-1971
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Iwata, Tetsu.
|e editor.
|0 (orcid)0000-0002-4729-0979
|1 https://orcid.org/0000-0002-4729-0979
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030053772
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030053796
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11356
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-05378-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|