Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1361
Title: Paradigms in cryptology -- Mycrypt 2016 :
Other Titles: malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers /
Mycrypt 2016 ;
Authors: International Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ;;Phan, Raphael C.-W. ; editor ;;Yung, Moti, ; editor ;
subject: Data encryption (Computer science) ; Congresses ;;Computer security ; Congresses ;;Cryptography ; Congresses ;;Data protection ; Congresses ;
Year: 2017
place: Cham, Switzerland :
Publisher: Springer,
Series/Report no.: Lecture notes in computer science, ; 0302-9743 ; ; 10311 ;
LNCS sublibrary. SL 4, Security and cryptology ;
Lecture notes in computer science ; ; 10311. ; 0302-9743 ;
LNCS sublibrary. ; SL 4, ; Security and cryptology ;
Abstract: This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ;
Description: Ohio Library and Information Network ;
QA76.9.A25 ;
Available to OhioLINK libraries ;

URI: http://localhost/handle/Hannan/1361
ISBN: 9783319612737 ;
3319612735 ;
More Information: 1 online resource (xi, 573 pages) : ; illustrations ;
Includes author index ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319612737.pdf14.47 MBAdobe PDFThumbnail
Preview File
Title: Paradigms in cryptology -- Mycrypt 2016 :
Other Titles: malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers /
Mycrypt 2016 ;
Authors: International Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ;;Phan, Raphael C.-W. ; editor ;;Yung, Moti, ; editor ;
subject: Data encryption (Computer science) ; Congresses ;;Computer security ; Congresses ;;Cryptography ; Congresses ;;Data protection ; Congresses ;
Year: 2017
place: Cham, Switzerland :
Publisher: Springer,
Series/Report no.: Lecture notes in computer science, ; 0302-9743 ; ; 10311 ;
LNCS sublibrary. SL 4, Security and cryptology ;
Lecture notes in computer science ; ; 10311. ; 0302-9743 ;
LNCS sublibrary. ; SL 4, ; Security and cryptology ;
Abstract: This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ;
Description: Ohio Library and Information Network ;
QA76.9.A25 ;
Available to OhioLINK libraries ;

URI: http://localhost/handle/Hannan/1361
ISBN: 9783319612737 ;
3319612735 ;
More Information: 1 online resource (xi, 573 pages) : ; illustrations ;
Includes author index ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319612737.pdf14.47 MBAdobe PDFThumbnail
Preview File
Title: Paradigms in cryptology -- Mycrypt 2016 :
Other Titles: malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers /
Mycrypt 2016 ;
Authors: International Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ;;Phan, Raphael C.-W. ; editor ;;Yung, Moti, ; editor ;
subject: Data encryption (Computer science) ; Congresses ;;Computer security ; Congresses ;;Cryptography ; Congresses ;;Data protection ; Congresses ;
Year: 2017
place: Cham, Switzerland :
Publisher: Springer,
Series/Report no.: Lecture notes in computer science, ; 0302-9743 ; ; 10311 ;
LNCS sublibrary. SL 4, Security and cryptology ;
Lecture notes in computer science ; ; 10311. ; 0302-9743 ;
LNCS sublibrary. ; SL 4, ; Security and cryptology ;
Abstract: This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ;
Description: Ohio Library and Information Network ;
QA76.9.A25 ;
Available to OhioLINK libraries ;

URI: http://localhost/handle/Hannan/1361
ISBN: 9783319612737 ;
3319612735 ;
More Information: 1 online resource (xi, 573 pages) : ; illustrations ;
Includes author index ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319612737.pdf14.47 MBAdobe PDFThumbnail
Preview File