|
|
|
|
LEADER |
02866nam a22005655i 4500 |
001 |
978-3-319-49890-4 |
003 |
DE-He213 |
005 |
20161110045729.0 |
007 |
cr nn 008mamaa |
008 |
161110s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319498904
|9 978-3-319-49890-4
|
024 |
7 |
|
|a 10.1007/978-3-319-49890-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Progress in Cryptology – INDOCRYPT 2016
|h [electronic resource] :
|b 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings /
|c edited by Orr Dunkelman, Somitra Kumar Sanadhya.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XVII, 429 p. 66 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10095
|
505 |
0 |
|
|a Public-Key Cryptography -- Cryptographic Protocols -- Side-Channel Attacks -- Implementation of Cryptographic Schemes -- Functional Encryption -- Symmetric-Key Cryptanalysis -- Foundations -- New Cryptographic Constructions.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computer science
|x Mathematics.
|
650 |
|
0 |
|a Management information systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
700 |
1 |
|
|a Dunkelman, Orr.
|e editor.
|
700 |
1 |
|
|a Sanadhya, Somitra Kumar.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319498898
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 10095
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-49890-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|