TY - BOOK AU - Foresti,Sara AU - Persiano,Giuseppe ED - International Conference on Cryptology and Network Security TI - Cryptology and network security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings T2 - Lecture notes in computer science, SN - 9783319489650 AV - QA76.9.A25 U1 - 005.8/2 23 PY - 2016/// CY - Cham, Switzerland PB - Springer KW - Data encryption (Computer science) KW - Congresses KW - Computer networks KW - Security measures KW - Computer science KW - Computer security KW - Coding theory KW - Management information systems KW - Electronic Data Processing KW - Computer Communication Networks KW - Computer Security KW - Management Information Systems KW - Chiffrement (Informatique) KW - Congrès KW - Réseaux d'ordinateurs KW - Sécurité KW - Mesures KW - Informatique KW - Sécurité informatique KW - Systèmes d'information de gestion KW - bicssc KW - Network hardware KW - Coding theory & cryptology KW - Information architecture KW - Computers KW - Security KW - General KW - bisacsh KW - Hardware KW - Network Hardware KW - Information Theory KW - Business & Economics KW - Information Management KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index N2 - This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication UR - https://link.springer.com/10.1007/978-3-319-48965-0 ER -