Security and cryptography for networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings /
<p>This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. </p><p>The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized...
Guardat en:
| Autor corporatiu: | |
|---|---|
| Altres autors: | , |
| Format: | eBook |
| Idioma: | English |
| Publicat: |
Berlin, Heidelberg
Imprint: Springer
2012.
|
| Col·lecció: | Lecture notes in computer science
7485 |
| Matèries: | |
| Accés en línia: | Click here to view the full text content |
| Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
| LEADER | 02171nam a2200421 i 4500 | ||
|---|---|---|---|
| 001 | vtls000106119 | ||
| 003 | MY-ArUMP | ||
| 005 | 20210731152146.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 121130s2012 gw | fs |||| 0|eng d | ||
| 020 | |a 9783642329289 |9 978-3-642-32928-9 | ||
| 039 | 9 | |a 201304231144 |b SMI |c 201211302351 |d NY |y 201211141242 |z SMR | |
| 040 | |a MYPMP |b eng |c MYPMP |e rda | ||
| 245 | 1 | 0 | |a Security and cryptography for networks |b 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings / |c edited by Ivan Visconti, Roberto Prisco. |
| 264 | 1 | |a Berlin, Heidelberg |b Imprint: Springer |c 2012. | |
| 300 | |a xi, 582 p. 75 illus. |b digital. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 347 | |a text file |b PDF |2 rda | ||
| 490 | 0 | |a Lecture notes in computer science |x 0302-9743 |v 7485 | |
| 520 | |a <p>This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. </p><p>The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.</p> | ||
| 650 | 0 | |a Computer science. | |
| 650 | 0 | |a Computer Communication Networks. | |
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Data encryption (Computer science). | |
| 650 | 0 | |a Information Systems. | |
| 700 | 1 | |a Prisco, Roberto. | |
| 700 | 1 | |a Visconti, Ivan. | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer eBooks | |
| 776 | 0 | 8 | |i Printed edition: |z 9783642329272 |
| 830 | 0 | |a Lecture notes in computer science |x 0302-9743 |v 7485 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-32928-9 |y Click here to view the full text content |
| 942 | |2 lcc |c BK-EBOOK | ||
| 949 | |a VIRTUAITEM |d 10011 |f 1 |x 9 | ||
| 999 | |c 49450 |d 49450 | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |7 0 |9 45083 |a FSGM |b FSGM |d 2021-07-31 |l 0 |r 2021-07-31 |t 1 |w 2021-07-31 |y BK-EBOOK | ||