Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/792
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Preneel, Bart. ; | en_US |
dc.contributor.author | Vercauteren, Frederik. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:09Z | - |
dc.date.available | 2020-05-17T08:22:09Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319933870 ; | en_US |
dc.identifier.isbn | 9783319933863 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/792 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319933863. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. ; | en_US |
dc.description.statementofresponsibility | edited by Bart Preneel, Frederik Vercauteren. | en_US |
dc.description.tableofcontents | Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. ; | en_US |
dc.format.extent | XIV, 716 p. 135 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ; | en_US |
dc.relation.haspart | 9783319933863.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Information Systems Applications | en_US |
dc.title | Applied Cryptography and Network Security | en_US |
dc.title.alternative | 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319933863.pdf | 23.45 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Preneel, Bart. ; | en_US |
dc.contributor.author | Vercauteren, Frederik. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:09Z | - |
dc.date.available | 2020-05-17T08:22:09Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319933870 ; | en_US |
dc.identifier.isbn | 9783319933863 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/792 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319933863. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. ; | en_US |
dc.description.statementofresponsibility | edited by Bart Preneel, Frederik Vercauteren. | en_US |
dc.description.tableofcontents | Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. ; | en_US |
dc.format.extent | XIV, 716 p. 135 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ; | en_US |
dc.relation.haspart | 9783319933863.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Information Systems Applications | en_US |
dc.title | Applied Cryptography and Network Security | en_US |
dc.title.alternative | 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319933863.pdf | 23.45 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Preneel, Bart. ; | en_US |
dc.contributor.author | Vercauteren, Frederik. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:09Z | - |
dc.date.available | 2020-05-17T08:22:09Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319933870 ; | en_US |
dc.identifier.isbn | 9783319933863 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/792 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | en_US | |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319933863. ; | en_US |
dc.description | QA76.9.A25 ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. ; | en_US |
dc.description.statementofresponsibility | edited by Bart Preneel, Frederik Vercauteren. | en_US |
dc.description.tableofcontents | Cryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. ; | en_US |
dc.format.extent | XIV, 716 p. 135 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10892. ; | en_US |
dc.relation.haspart | 9783319933863.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computers and civilization. ; | en_US |
dc.subject | Computers | en_US |
dc.subject | Law and legislation. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.subject | Computers and Society. ; | en_US |
dc.subject | Legal Aspects of Computing. ; | en_US |
dc.subject | Information Systems Applications | en_US |
dc.title | Applied Cryptography and Network Security | en_US |
dc.title.alternative | 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319933863.pdf | 23.45 MB | Adobe PDF | Preview File |