Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applied cryptography and network sec...
~
Manulis, Mark.
Linked to FindBook
Google Book
Amazon
博客來
Applied cryptography and network security = 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Applied cryptography and network security/ edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider.
Reminder of title:
14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
remainder title:
ACNS 2016
other author:
Manulis, Mark.
Published:
Cham :Springer International Publishing : : 2016.,
Description:
xiv, 668 p. :ill., digital ;24 cm.
[NT 15003449]:
Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science) -
Online resource:
http://dx.doi.org/10.1007/978-3-319-39555-5
ISBN:
9783319395555
Applied cryptography and network security = 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
Applied cryptography and network security
14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /[electronic resource] :ACNS 2016edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider. - Cham :Springer International Publishing :2016. - xiv, 668 p. :ill., digital ;24 cm. - Lecture notes in computer science,96960302-9743 ;. - Lecture notes in computer science ;5353..
Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
ISBN: 9783319395555
Standard No.: 10.1007/978-3-319-39555-5doiSubjects--Topical Terms:
579162
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Applied cryptography and network security = 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
LDR
:01975nmm a2200349 a 4500
001
2041197
003
DE-He213
005
20161118085142.0
006
m d
007
cr nn 008maaau
008
170118s2016 gw s 0 eng d
020
$a
9783319395555
$q
(electronic bk.)
020
$a
9783319395548
$q
(paper)
024
7
$a
10.1007/978-3-319-39555-5
$2
doi
035
$a
978-3-319-39555-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
A184 2016
245
1 0
$a
Applied cryptography and network security
$h
[electronic resource] :
$b
14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016 : proceedings /
$c
edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider.
246
3
$a
ACNS 2016
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xiv, 668 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9696
505
0
$a
Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
520
$a
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
1244118
650
0
$a
Cloud computing
$v
Congresses.
$3
1567603
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Data Encryption.
$3
891254
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Management of Computing and Information Systems.
$3
892490
650
2 4
$a
Theory of Computation.
$3
892514
650
2 4
$a
Computers and Society.
$3
891253
700
1
$a
Manulis, Mark.
$3
1619324
700
1
$a
Sadeghi, Ahmad-Reza.
$3
908024
700
1
$a
Schneider, Steve.
$3
2199741
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
5353.
$x
0302-9743
$3
1274248
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-39555-5
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9282059
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A184 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login