Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

Author:   Michel Abdalla ,  Roberto De Prisco
Publisher:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8642
ISBN:  

9783319108780


Pages:   609
Publication Date:   22 September 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.

Full Product Details

Author:   Michel Abdalla ,  Roberto De Prisco
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8642
Dimensions:   Width: 15.50cm , Height: 3.20cm , Length: 23.50cm
Weight:   9.416kg
ISBN:  

9783319108780


ISBN 10:   3319108786
Pages:   609
Publication Date:   22 September 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Key exchange.- Multilinear maps and obfuscation.-Pseudorandom function extensions.- Secure computation - foundations and algorithms.- Network security.- Functional encryption.- Cryptanalysis.- Secure computation - implementation.- Zero knowledge.- Message authentication.- Proofs of space and erasure.- Public-key encryption.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List