Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/792
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPreneel, Bart. ;en_US
dc.contributor.authorVercauteren, Frederik. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:09Z-
dc.date.available2020-05-17T08:22:09Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319933870 ;en_US
dc.identifier.isbn9783319933863 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/792-
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319933863. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. ;en_US
dc.description.statementofresponsibilityedited by Bart Preneel, Frederik Vercauteren.en_US
dc.description.tableofcontentsCryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. ;en_US
dc.format.extentXIV, 716 p. 135 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ;en_US
dc.relation.haspart9783319933863.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectCoding and Information Theory. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectInformation Systems Applicationsen_US
dc.titleApplied Cryptography and Network Securityen_US
dc.title.alternative16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319933863.pdf23.45 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPreneel, Bart. ;en_US
dc.contributor.authorVercauteren, Frederik. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:09Z-
dc.date.available2020-05-17T08:22:09Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319933870 ;en_US
dc.identifier.isbn9783319933863 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/792-
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319933863. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. ;en_US
dc.description.statementofresponsibilityedited by Bart Preneel, Frederik Vercauteren.en_US
dc.description.tableofcontentsCryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. ;en_US
dc.format.extentXIV, 716 p. 135 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ;en_US
dc.relation.haspart9783319933863.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectCoding and Information Theory. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectInformation Systems Applicationsen_US
dc.titleApplied Cryptography and Network Securityen_US
dc.title.alternative16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319933863.pdf23.45 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPreneel, Bart. ;en_US
dc.contributor.authorVercauteren, Frederik. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:09Z-
dc.date.available2020-05-17T08:22:09Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319933870 ;en_US
dc.identifier.isbn9783319933863 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/792-
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319933863. ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. ;en_US
dc.description.statementofresponsibilityedited by Bart Preneel, Frederik Vercauteren.en_US
dc.description.tableofcontentsCryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. ;en_US
dc.format.extentXIV, 716 p. 135 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ;en_US
dc.relation.haspart9783319933863.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectCoding theory. ;en_US
dc.subjectComputers and civilization. ;en_US
dc.subjectComputersen_US
dc.subjectLaw and legislation. ;en_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectCoding and Information Theory. ;en_US
dc.subjectComputers and Society. ;en_US
dc.subjectLegal Aspects of Computing. ;en_US
dc.subjectInformation Systems Applicationsen_US
dc.titleApplied Cryptography and Network Securityen_US
dc.title.alternative16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319933863.pdf23.45 MBAdobe PDFThumbnail
Preview File