Welcome to Central Library, SUST
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptology and Network Security [electronic resource] : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 8257Publisher: Cham : Springer International Publishing : Imprint: Springer, 2013Description: XVIII, 349 p. 52 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319029375
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. .
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. .

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

There are no comments on this title.

to post a comment.