Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Selected areas in cryptography - SAC...
~
SAC (Conference) (2018 :)
Linked to FindBook
Google Book
Amazon
博客來
Selected areas in cryptography - SAC 2018 = 25th International Conference, Calgary, AB, Canada, August 15-17, 2018 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Selected areas in cryptography - SAC 2018/ edited by Carlos Cid, Michael J. Jacobson Jr.
Reminder of title:
25th International Conference, Calgary, AB, Canada, August 15-17, 2018 : revised selected papers /
remainder title:
SAC 2018
other author:
Cid, Carlos.
corporate name:
SAC (Conference)
Published:
Cham :Springer International Publishing : : 2019.,
Description:
xi, 499 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-030-10970-7
ISBN:
9783030109707
Selected areas in cryptography - SAC 2018 = 25th International Conference, Calgary, AB, Canada, August 15-17, 2018 : revised selected papers /
Selected areas in cryptography - SAC 2018
25th International Conference, Calgary, AB, Canada, August 15-17, 2018 : revised selected papers /[electronic resource] :SAC 2018edited by Carlos Cid, Michael J. Jacobson Jr. - Cham :Springer International Publishing :2019. - xi, 499 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,113490302-9743 ;. - Lecture notes in computer science ;11349..
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.
ISBN: 9783030109707
Standard No.: 10.1007/978-3-030-10970-7doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Selected areas in cryptography - SAC 2018 = 25th International Conference, Calgary, AB, Canada, August 15-17, 2018 : revised selected papers /
LDR
:01875nmm a2200361 a 4500
001
2178392
003
DE-He213
005
20190112110938.0
006
m d
007
cr nn 008maaau
008
191122s2019 gw s 0 eng d
020
$a
9783030109707
$q
(electronic bk.)
020
$a
9783030109691
$q
(paper)
024
7
$a
10.1007/978-3-030-10970-7
$2
doi
035
$a
978-3-030-10970-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
S119 2018
111
2
$a
SAC (Conference)
$n
(25th :
$d
2018 :
$c
Calgary, Alta.)
$3
3382551
245
1 0
$a
Selected areas in cryptography - SAC 2018
$h
[electronic resource] :
$b
25th International Conference, Calgary, AB, Canada, August 15-17, 2018 : revised selected papers /
$c
edited by Carlos Cid, Michael J. Jacobson Jr.
246
3
$a
SAC 2018
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xi, 499 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11349
490
1
$a
Security and cryptology
520
$a
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Probability and Statistics in Computer Science.
$3
891072
700
1
$a
Cid, Carlos.
$3
2145405
700
1
$a
Jacobson, Michael J.
$3
789925
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
11349.
$3
3382552
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-10970-7
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9368249
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login