Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings / [electronic resource] :
edited by Vassilis Zikas, Roberto De Prisco.
- XIX, 606 p. 75 illus. online resource.
- Lecture Notes in Computer Science, 9841 0302-9743 ; .
- Lecture Notes in Computer Science, 9841 .
Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
9783319446189
10.1007/978-3-319-44618-9 doi
Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Management of Computing and Information Systems.
Computer Communication Networks.
QA76.9.A25
005.82
Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
9783319446189
10.1007/978-3-319-44618-9 doi
Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Management of Computing and Information Systems.
Computer Communication Networks.
QA76.9.A25
005.82