Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Selected areas in cryptography - SAC...
~
SAC (Conference) (2019 :)
Linked to FindBook
Google Book
Amazon
博客來
Selected areas in cryptography - SAC 2019 = 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Selected areas in cryptography - SAC 2019/ edited by Kenneth G. Paterson, Douglas Stebila.
Reminder of title:
26th International Conference, Waterloo, ON, Canada, August 12-16, 2019 : revised selected papers /
remainder title:
SAC 2019
other author:
Paterson, Kenneth G.
corporate name:
SAC (Conference)
Published:
Cham :Springer International Publishing : : 2020.,
Description:
xv, 715 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-030-38471-5
ISBN:
9783030384715
Selected areas in cryptography - SAC 2019 = 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019 : revised selected papers /
Selected areas in cryptography - SAC 2019
26th International Conference, Waterloo, ON, Canada, August 12-16, 2019 : revised selected papers /[electronic resource] :SAC 2019edited by Kenneth G. Paterson, Douglas Stebila. - Cham :Springer International Publishing :2020. - xv, 715 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,119590302-9743 ;. - Lecture notes in computer science ;11959..
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.
ISBN: 9783030384715
Standard No.: 10.1007/978-3-030-38471-5doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25 / S33 2019
Dewey Class. No.: 005.8
Selected areas in cryptography - SAC 2019 = 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019 : revised selected papers /
LDR
:01891nmm a2200361 a 4500
001
2215550
003
DE-He213
005
20200109223035.0
006
m d
007
cr nn 008maaau
008
201120s2020 sz s 0 eng d
020
$a
9783030384715
$q
(electronic bk.)
020
$a
9783030384708
$q
(paper)
024
7
$a
10.1007/978-3-030-38471-5
$2
doi
035
$a
978-3-030-38471-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
S33 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S119 2019
111
2
$a
SAC (Conference)
$n
(26th :
$d
2019 :
$c
Waterloo, Ont.)
$3
3447171
245
1 0
$a
Selected areas in cryptography - SAC 2019
$h
[electronic resource] :
$b
26th International Conference, Waterloo, ON, Canada, August 12-16, 2019 : revised selected papers /
$c
edited by Kenneth G. Paterson, Douglas Stebila.
246
3
$a
SAC 2019
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xv, 715 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11959
490
1
$a
Security and cryptology
520
$a
This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
891212
650
2 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Paterson, Kenneth G.
$3
3447172
700
1
$a
Stebila, Douglas.
$3
2156426
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
11959.
$3
3447173
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-38471-5
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9390454
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 S33 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login