Normal view MARC view ISBD view

Pairing-Based Cryptography -- Pairing 2013 [electronic resource] : 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers / edited by Zhenfu Cao, Fangguo Zhang.

Contributor(s): Cao, Zhenfu [editor.] | Zhang, Fangguo [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 8365Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Edition: 1st ed. 2014.Description: X, 251 p. 10 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319048734.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Coding theory | Information theory | Computer science | Cryptology | Data and Information Security | Coding and Information Theory | Theory of ComputationAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.

There are no comments for this item.

Log in to your account to post a comment.