Cryptology and network security [electronic resource] : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis.
2014
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Details
Title
Cryptology and network security [electronic resource] : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings / edited by Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis.
Meeting Name
ISBN
9783319122809 electronic book
3319122800 electronic book
9783319122793
3319122800 electronic book
9783319122793
Published
Cham : Springer, 2014.
Language
English
Description
1 online resource (xvi, 401 pages) : illustrations.
Item Number
10.1007/978-3-319-12280-9 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/2
Summary
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed November 5, 2014).
Series
Lecture notes in computer science ; 8813.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
Encryption
Cryptanalysis
Malware analysis
Privacy and identification systems
Types of network protocol design
Analysis work.
Cryptanalysis
Malware analysis
Privacy and identification systems
Types of network protocol design
Analysis work.