000 03983nam a22005775i 4500
999 _c200434051
_d52263
003 DE-He213
005 20231104114300.0
007 cr nn 008mamaa
008 160108s2015 gw | s |||| 0|eng d
020 _a9783319281667
_z978-3-319-28166-7
024 7 _a10.1007/978-3-319-28166-7
_2doi
040 _aTR-AnTOB
_beng
_cTR-AnTOB
_erda
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema005.8
_223
245 1 0 _aApplied Cryptography and Network Security :
_b13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers /
_cedited by Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis.
250 _a1st ed. 2015.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSecurity and Cryptology ;
_v9092
505 0 _aSecure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness.
520 _aThis book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aComputer Communication Networks.
650 0 _aInformation Systems.
650 0 _aInformation theory.
650 0 _aComputer science.
650 1 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aCryptology.
_0http://scigraph.springernature.com/things/product-market-codes/I28020
650 2 4 _aComputer Communication Networks.
_0http://scigraph.springernature.com/things/product-market-codes/I13022
650 2 4 _aManagement of Computing and Information Systems.
_0http://scigraph.springernature.com/things/product-market-codes/I24067
650 2 4 _aTheory of Computation.
_0http://scigraph.springernature.com/things/product-market-codes/I16005
650 2 4 _aComputers and Society.
_0http://scigraph.springernature.com/things/product-market-codes/I24040
700 1 _aMalkin, Tal.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKolesnikov, Vladimir.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLewko, Allison Bishop.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPolychronakis, Michalis.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
856 4 0 _3Springer eBooks
_zOnline access link to the resource
_uhttps://doi.org/10.1007/978-3-319-28166-7
942 _2lcc
_cEBK
041 _aeng