Cryptology and network security : 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017, Revised selected papers / Srdjan Capkun, Sherman S.M. Chow (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 11261. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, 2018Description: 1 online resource (xvii, 548 pages) : illustrations (some color)Content type: - text
- computer
- online resource
- 9783030026417
- 3030026418
- CANS 2017
- Data encryption (Computer science) -- Congresses
- Computer networks -- Security measures -- Congresses
- Chiffrement (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Software Engineering
- Data mining
- Information retrieval
- Ethical & social aspects of IT
- Coding theory & cryptology
- Computers -- Software Development & Engineering -- General
- Computers -- Database Management -- Data Mining
- Computers -- Information Technology
- Computers -- Social Aspects -- General
- Computers -- Security -- General
- Computer networks -- Security measures
- Data encryption (Computer science)
- 005.8/24 23
- QA76.9.A25
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed November 20, 2018).
Foundation of Applied Cryptography -- Processing Encrypted Data -- Predicate Encryption -- Credentials and Authentication -- Web Security -- Bitcoin and Blockchain -- Embedded System Security -- Anonymous and Virtual Private Networks -- Wireless and Physical Layer Security -- Short Papers.
This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.