Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1361
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ;en_US
dc.contributor.authorPhan, Raphael C.-W. ; editor ;en_US
dc.contributor.authorYung, Moti, ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:06Z-
dc.date.available2020-05-17T08:28:06Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319612737 ;en_US
dc.identifier.isbn3319612735 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1361-
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ;en_US
dc.description.statementofresponsibilityRaphael C.-W. Phan, Moti Yung (eds.)en_US
dc.description.tableofcontentsRevisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence ;en_US
dc.format.extent1 online resource (xi, 573 pages) : ; illustrations ;en_US
dc.format.extentIncludes author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture notes in computer science, ; 0302-9743 ; ; 10311 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and cryptology ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10311. ; 0302-9743 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. ; SL 4, ; Security and cryptology ;en_US
dc.relation.haspart9783319612737.pdfen_US
dc.subjectData encryption (Computer science) ; Congresses ;en_US
dc.subjectComputer security ; Congresses ;en_US
dc.subjectCryptography ; Congresses ;en_US
dc.subjectData protection ; Congresses ;en_US
dc.titleParadigms in cryptology -- Mycrypt 2016 :en_US
dc.title.alternativemalicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers /en_US
dc.title.alternativeMycrypt 2016 ;en_US
dc.typeBooken_US
dc.publisher.placeCham, Switzerland :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319612737.pdf14.47 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ;en_US
dc.contributor.authorPhan, Raphael C.-W. ; editor ;en_US
dc.contributor.authorYung, Moti, ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:06Z-
dc.date.available2020-05-17T08:28:06Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319612737 ;en_US
dc.identifier.isbn3319612735 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1361-
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ;en_US
dc.description.statementofresponsibilityRaphael C.-W. Phan, Moti Yung (eds.)en_US
dc.description.tableofcontentsRevisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence ;en_US
dc.format.extent1 online resource (xi, 573 pages) : ; illustrations ;en_US
dc.format.extentIncludes author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture notes in computer science, ; 0302-9743 ; ; 10311 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and cryptology ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10311. ; 0302-9743 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. ; SL 4, ; Security and cryptology ;en_US
dc.relation.haspart9783319612737.pdfen_US
dc.subjectData encryption (Computer science) ; Congresses ;en_US
dc.subjectComputer security ; Congresses ;en_US
dc.subjectCryptography ; Congresses ;en_US
dc.subjectData protection ; Congresses ;en_US
dc.titleParadigms in cryptology -- Mycrypt 2016 :en_US
dc.title.alternativemalicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers /en_US
dc.title.alternativeMycrypt 2016 ;en_US
dc.typeBooken_US
dc.publisher.placeCham, Switzerland :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319612737.pdf14.47 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ;en_US
dc.contributor.authorPhan, Raphael C.-W. ; editor ;en_US
dc.contributor.authorYung, Moti, ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:06Z-
dc.date.available2020-05-17T08:28:06Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319612737 ;en_US
dc.identifier.isbn3319612735 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1361-
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ;en_US
dc.description.statementofresponsibilityRaphael C.-W. Phan, Moti Yung (eds.)en_US
dc.description.tableofcontentsRevisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence ;en_US
dc.format.extent1 online resource (xi, 573 pages) : ; illustrations ;en_US
dc.format.extentIncludes author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture notes in computer science, ; 0302-9743 ; ; 10311 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and cryptology ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10311. ; 0302-9743 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. ; SL 4, ; Security and cryptology ;en_US
dc.relation.haspart9783319612737.pdfen_US
dc.subjectData encryption (Computer science) ; Congresses ;en_US
dc.subjectComputer security ; Congresses ;en_US
dc.subjectCryptography ; Congresses ;en_US
dc.subjectData protection ; Congresses ;en_US
dc.titleParadigms in cryptology -- Mycrypt 2016 :en_US
dc.title.alternativemalicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers /en_US
dc.title.alternativeMycrypt 2016 ;en_US
dc.typeBooken_US
dc.publisher.placeCham, Switzerland :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319612737.pdf14.47 MBAdobe PDFThumbnail
Preview File