Cryptology and network security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / Sara Foresti, Giuseppe Persiano (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 10052. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, 2016Description: 1 online resource (xvi, 762 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319489650
- 3319489658
- 331948964X
- 9783319489643
- CANS 2016
- Data encryption (Computer science) -- Congresses
- Computer networks -- Security measures -- Congresses
- Computer science
- Computer networks
- Computer security
- Data encryption (Computer science)
- Coding theory
- Management information systems
- Electronic Data Processing
- Computer Communication Networks
- Computer Security
- Management Information Systems
- Chiffrement (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Informatique
- Réseaux d'ordinateurs
- Sécurité informatique
- Chiffrement (Informatique)
- Systèmes d'information de gestion
- Computer security
- Network hardware
- Coding theory & cryptology
- Information architecture
- Computers -- Security -- General
- Computers -- Hardware -- Network Hardware
- Computers -- Information Theory
- Business & Economics -- Information Management
- Coding theory
- Computer networks
- Computer networks -- Security measures
- Computer science
- Computer security
- Data encryption (Computer science)
- Management information systems
- 005.8/2 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
International conference proceedings.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
Includes author index.