|
|
|
|
LEADER |
02805nam a22005055i 4500 |
001 |
978-3-319-10879-7 |
003 |
DE-He213 |
005 |
20151204181712.0 |
007 |
cr nn 008mamaa |
008 |
140821s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319108797
|9 978-3-319-10879-7
|
024 |
7 |
|
|a 10.1007/978-3-319-10879-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Security and Cryptography for Networks
|h [electronic resource] :
|b 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings /
|c edited by Michel Abdalla, Roberto De Prisco.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XX, 609 p. 101 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8642
|
505 |
0 |
|
|a Key exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption.
|
520 |
|
|
|a This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
|
|a Abdalla, Michel.
|e editor.
|
700 |
1 |
|
|a Prisco, Roberto De.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319108780
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8642
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-10879-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|