Information security and cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised selected papers / Kefei Chen, Dongdai Lin, Moti Yung (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 10143. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, 2017Description: 1 online resource (xiii, 544 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319547053
- 3319547054
- Inscrypt 2016
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Software Engineering
- Coding theory & cryptology
- Ethical & social aspects of IT
- Network hardware
- Information retrieval
- Computer security
- Computers -- Software Development & Engineering -- General
- Computers -- Security -- General
- Computers -- Social Aspects -- General
- Computers -- Hardware -- Network Hardware
- Computers -- Information Technology
- Computer security
- Data encryption (Computer science)
- 005.8 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed March 9, 2017).
Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
Includes bibliographical references and author index.