Overview
- Fast track conference proceedings
- Unique visibility
- State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7341)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ACNS 2012.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (33 papers)
-
Cryptographic Primitives
Other volumes
-
Applied Cryptography and Network Security
Keywords
About this book
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Editors and Affiliations
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings
Editors: Feng Bao, Pierangela Samarati, Jianying Zhou
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-31284-7
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2012
Softcover ISBN: 978-3-642-31283-0Published: 19 June 2012
eBook ISBN: 978-3-642-31284-7Published: 14 June 2012
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 580
Number of Illustrations: 107 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems, Computer Communication Networks, Coding and Information Theory, Data Structures