Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

ISBN-10:
3319108786
ISBN-13:
9783319108780
Pub. Date:
07/30/2014
Publisher:
Springer International Publishing
ISBN-10:
3319108786
ISBN-13:
9783319108780
Pub. Date:
07/30/2014
Publisher:
Springer International Publishing
Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

Security and Cryptography for Networks: 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days. Not Eligible for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.

Product Details

ISBN-13: 9783319108780
Publisher: Springer International Publishing
Publication date: 07/30/2014
Series: Lecture Notes in Computer Science , #8642
Edition description: 2014
Pages: 609
Product dimensions: 6.10(w) x 9.25(h) x 0.05(d)

Table of Contents

Key exchange.- Multilinear maps and obfuscation.-Pseudorandom function extensions.- Secure computation - foundations and algorithms.- Network security.- Functional encryption.- Cryptanalysis.- Secure computation - implementation.- Zero knowledge.- Message authentication.- Proofs of space and erasure.- Public-key encryption.
From the B&N Reads Blog

Customer Reviews