|
|
|
|
LEADER |
03418nam a2200577 4500 |
001 |
978-3-030-10970-7 |
003 |
DE-He213 |
005 |
20191220125833.0 |
007 |
cr nn 008mamaa |
008 |
190112s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030109707
|9 978-3-030-10970-7
|
024 |
7 |
|
|a 10.1007/978-3-030-10970-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Selected Areas in Cryptography - SAC 2018
|h [electronic resource] :
|b 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers /
|c edited by Carlos Cid, Michael J. Jacobson Jr.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XI, 499 p. 210 illus., 50 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11349
|
520 |
|
|
|a This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Mathematical statistics.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Mobile and Network Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28050
|
650 |
2 |
4 |
|a Security Services.
|0 http://scigraph.springernature.com/things/product-market-codes/I28030
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13022
|
650 |
2 |
4 |
|a Probability and Statistics in Computer Science.
|0 http://scigraph.springernature.com/things/product-market-codes/I17036
|
700 |
1 |
|
|a Cid, Carlos.
|e editor.
|0 (orcid)0000-0001-5761-8694
|1 https://orcid.org/0000-0001-5761-8694
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Jacobson Jr., Michael J.
|e editor.
|0 (orcid)0000-0002-4906-0544
|1 https://orcid.org/0000-0002-4906-0544
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030109691
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030109714
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11349
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-10970-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|