Coverart for item
The Resource Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings, Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.), (electronic book)

Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings, Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.), (electronic book)

Label
Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings
Title
Applied cryptography and network security
Title remainder
14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings
Statement of responsibility
Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.)
Title variation
ACNS 2016
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
Member of
Cataloging source
GW5XE
Dewey number
005.8/2
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2016
http://bibfra.me/vocab/lite/meetingName
ACNS (Conference)
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Manulis, Mark
  • Sadeghi, Ahmad-Reza
  • Schneider, Steve
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
9696
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer networks
  • Cloud computing
  • Computer Science
  • Systems and Data Security
  • Data Encryption
  • Computer Communication Networks
  • Management of Computing and Information Systems
  • Theory of Computation
  • Computers and Society
Label
Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings, Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.), (electronic book)
Instantiates
Publication
Note
  • International conference proceedings
  • Includes author index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use
Control code
SPR951807257
Dimensions
unknown
Extent
1 online resource (xiv, 668 pages)
File format
unknown
Form of item
online
Isbn
9783319395555
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-39555-5
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
Label
Applied cryptography and network security : 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings, Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.), (electronic book)
Publication
Note
  • International conference proceedings
  • Includes author index
Antecedent source
unknown
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use
Control code
SPR951807257
Dimensions
unknown
Extent
1 online resource (xiv, 668 pages)
File format
unknown
Form of item
online
Isbn
9783319395555
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-39555-5
Other physical details
illustrations.
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...