
Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9696)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ACNS 2016.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
Table of contents (35 papers)
-
Authentication and Key Establishment
-
Signatures with Advanced Properties
-
DoS Attacks and Network Anomaly Detection
-
Deterministic and Functional Encryption
Other volumes
-
Applied Cryptography and Network Security
Editors and Affiliations
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings
Editors: Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-39555-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2016
Softcover ISBN: 978-3-319-39554-8Published: 10 June 2016
eBook ISBN: 978-3-319-39555-5Published: 09 June 2016
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 668
Number of Illustrations: 110 b/w illustrations
Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Management of Computing and Information Systems, Theory of Computation, Computers and Society