Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings

Author:   Mark Manulis ,  Ahmad-Reza Sadeghi ,  Steve Schneider
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2016
Volume:   9696
ISBN:  

9783319395548


Pages:   668
Publication Date:   10 June 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. 

Full Product Details

Author:   Mark Manulis ,  Ahmad-Reza Sadeghi ,  Steve Schneider
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2016
Volume:   9696
Dimensions:   Width: 15.50cm , Height: 3.50cm , Length: 23.50cm
Weight:   1.032kg
ISBN:  

9783319395548


ISBN 10:   3319395548
Pages:   668
Publication Date:   10 June 2016
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Authentication and Key Establishment.- Signatures with Advanced Properties.- DoS Attacks and Network Anomaly Detection.- Deterministic and Functional Encryption.- Computing on Encrypted Data.- Non-Interactive Proofs and PRFs.- Symmetric Ciphers.- Cryptography in Software.- Security for Human Use.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List