Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

Author:   Ioana Boureanu ,  Philippe Owesarski ,  Serge Vaudenay
Publisher:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8479
ISBN:  

9783319075358


Pages:   586
Publication Date:   01 July 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.

Full Product Details

Author:   Ioana Boureanu ,  Philippe Owesarski ,  Serge Vaudenay
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8479
Dimensions:   Width: 15.50cm , Height: 3.10cm , Length: 23.50cm
Weight:   9.007kg
ISBN:  

9783319075358


ISBN 10:   3319075357
Pages:   586
Publication Date:   01 July 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Key exchange.- Primitive construction.- Attacks (public-key cryptography).- Hashing.- Cryptanalysis and attacks (symmetric cryptography).- Network security.- Signatures.- System security.- Secure computation.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List