|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3319462 |
003 |
MWH |
005 |
20191024022408.0 |
007 |
cr nn 008mamaa |
008 |
160608s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319395555
|
024 |
7 |
|
|a 10.1007/978-3-319-39555-5
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-319-39555-5
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
245 |
1 |
0 |
|a Applied Cryptography and Network Security
|h [electronic resource] :
|b 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings /
|c edited by Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIV, 668 p. 110 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9696
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a Authentication and Key Establishment -- Signatures with Advanced Properties -- DoS Attacks and Network Anomaly Detection -- Deterministic and Functional Encryption -- Computing on Encrypted Data -- Non-Interactive Proofs and PRFs -- Symmetric Ciphers -- Cryptography in Software -- Security for Human Use.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy. .
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computers and civilization.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Manulis, Mark.
|e editor.
|0 (orcid)0000-0002-1512-9670
|1 https://orcid.org/0000-0002-1512-9670
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Sadeghi, Ahmad-Reza.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Schneider, Steve.
|e editor.
|0 (orcid)0000-0001-8365-6993
|1 https://orcid.org/0000-0001-8365-6993
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9696
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-319-39555-5
|3 Click to view e-book
|
907 |
|
|
|a .b33194622
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i22326248
|z 02-26-20
|
999 |
f |
f |
|i dec8c6a5-a1fa-5cde-9311-33ecf524273e
|s 5daba140-45b3-5ae0-be1a-162e785d335a
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|e E-Book
|h Library of Congress classification
|i Elec File
|n 1
|