|
|
|
|
LEADER |
03936nam a2200613 4500 |
001 |
978-3-030-21568-2 |
003 |
DE-He213 |
005 |
20191026062746.0 |
007 |
cr nn 008mamaa |
008 |
190528s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030215682
|9 978-3-030-21568-2
|
024 |
7 |
|
|a 10.1007/978-3-030-21568-2
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Applied Cryptography and Network Security
|h [electronic resource] :
|b 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings /
|c edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XIII, 614 p. 704 illus., 57 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11464
|
505 |
0 |
|
|a Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 http://scigraph.springernature.com/things/product-market-codes/I13006
|
650 |
2 |
4 |
|a Computing Milieux.
|0 http://scigraph.springernature.com/things/product-market-codes/I24008
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15009
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 http://scigraph.springernature.com/things/product-market-codes/I18008
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
700 |
1 |
|
|a Deng, Robert H.
|e editor.
|0 (orcid)0000-0003-3491-8146
|1 https://orcid.org/0000-0003-3491-8146
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Gauthier-Umaña, Valérie.
|e editor.
|0 (orcid)0000-0003-0909-7091
|1 https://orcid.org/0000-0003-0909-7091
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Ochoa, Martín.
|e editor.
|0 (orcid)0000-0002-7816-5775
|1 https://orcid.org/0000-0002-7816-5775
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Yung, Moti.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030215675
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030215699
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11464
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-21568-2
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|