Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1361
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | International Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ; | en_US |
dc.contributor.author | Phan, Raphael C.-W. ; editor ; | en_US |
dc.contributor.author | Yung, Moti, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:06Z | - |
dc.date.available | 2020-05-17T08:28:06Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319612737 ; | en_US |
dc.identifier.isbn | 3319612735 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1361 | - |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ; | en_US |
dc.description.statementofresponsibility | Raphael C.-W. Phan, Moti Yung (eds.) | en_US |
dc.description.tableofcontents | Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence ; | en_US |
dc.format.extent | 1 online resource (xi, 573 pages) : ; illustrations ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10311 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10311. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319612737.pdf | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Cryptography ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Paradigms in cryptology -- Mycrypt 2016 : | en_US |
dc.title.alternative | malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers / | en_US |
dc.title.alternative | Mycrypt 2016 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
dc.classification.dc | 005.8/24 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319612737.pdf | 14.47 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | International Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ; | en_US |
dc.contributor.author | Phan, Raphael C.-W. ; editor ; | en_US |
dc.contributor.author | Yung, Moti, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:06Z | - |
dc.date.available | 2020-05-17T08:28:06Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319612737 ; | en_US |
dc.identifier.isbn | 3319612735 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1361 | - |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ; | en_US |
dc.description.statementofresponsibility | Raphael C.-W. Phan, Moti Yung (eds.) | en_US |
dc.description.tableofcontents | Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence ; | en_US |
dc.format.extent | 1 online resource (xi, 573 pages) : ; illustrations ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10311 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10311. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319612737.pdf | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Cryptography ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Paradigms in cryptology -- Mycrypt 2016 : | en_US |
dc.title.alternative | malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers / | en_US |
dc.title.alternative | Mycrypt 2016 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
dc.classification.dc | 005.8/24 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319612737.pdf | 14.47 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | International Conference on Cryptology in Malaysia ; (2nd : ; 2016 : ; Kuala Lumpur, Malaysia) ; | en_US |
dc.contributor.author | Phan, Raphael C.-W. ; editor ; | en_US |
dc.contributor.author | Yung, Moti, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:06Z | - |
dc.date.available | 2020-05-17T08:28:06Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319612737 ; | en_US |
dc.identifier.isbn | 3319612735 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1361 | - |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. ; | en_US |
dc.description.statementofresponsibility | Raphael C.-W. Phan, Moti Yung (eds.) | en_US |
dc.description.tableofcontents | Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence ; | en_US |
dc.format.extent | 1 online resource (xi, 573 pages) : ; illustrations ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10311 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10311. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319612737.pdf | en_US |
dc.subject | Data encryption (Computer science) ; Congresses ; | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.subject | Cryptography ; Congresses ; | en_US |
dc.subject | Data protection ; Congresses ; | en_US |
dc.title | Paradigms in cryptology -- Mycrypt 2016 : | en_US |
dc.title.alternative | malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers / | en_US |
dc.title.alternative | Mycrypt 2016 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham, Switzerland : | en_US |
dc.classification.dc | 005.8/24 ; 23 ; | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319612737.pdf | 14.47 MB | Adobe PDF | Preview File |