skip to content
Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers Preview this item
ClosePreview this item
Checking...

Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers

Author: Tal Malkin; Vladimir Kolesnikov, (Computer scientist); Allison Bishop Lewko; Michalis Polychronakis, (Computer scientist)
Publisher: Cham : Springer, 2015. ©2015
Series: Lecture notes in computer science, 9092.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation:  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: (OCoLC)930257890
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Tal Malkin; Vladimir Kolesnikov, (Computer scientist); Allison Bishop Lewko; Michalis Polychronakis, (Computer scientist)
ISBN: 9783319281667 3319281666
OCLC Number: 934798884
Description: 1 online resource (xviii, 698 pages) : color illustrations.
Contents: Secure computation: primitives and new models --
Public key cryptographic primitives --
Secure computation II: applications --
Anonymity and related applications --
Cryptanalysis and attacks (symmetric crypto) --
Privacy and policy enforcement --
Authentication via eye tracking and proofs of proximity --
Malware analysis and side channel attacks --
Side channel countermeasures and tamper resistance/PUFs --
Leakage resilience and pseudorandomness.
Series Title: Lecture notes in computer science, 9092.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: ACNS
Responsibility: Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.).

Abstract:

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. They are  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/934798884> # Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "934798884" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/systems_and_data_security> ; # Systems and Data Security
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/theory_of_computation> ; # Theory of Computation
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/cloud_computing> ; # Cloud computing
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computers_and_society> ; # Computers and Society
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/data_encryption> ; # Data Encryption
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computer_science> ; # Computer Science
    schema:about <http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:alternateName "ACNS" ;
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2015" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/2946357736#Meeting/acns_conference_13th_2015_new_york_n_y> ; # ACNS (Conference) (13th : 2015 : New York, N.Y.)
    schema:datePublished "2015" ;
    schema:description "Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement -- Authentication via eye tracking and proofs of proximity -- Malware analysis and side channel attacks -- Side channel countermeasures and tamper resistance/PUFs -- Leakage resilience and pseudorandomness."@en ;
    schema:description "This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/2946357736#Person/kolesnikov_vladimir_computer_scientist> ; # (Computer scientist) Vladimir Kolesnikov
    schema:editor <http://experiment.worldcat.org/entity/work/data/2946357736#Person/malkin_tal> ; # Tal Malkin
    schema:editor <http://experiment.worldcat.org/entity/work/data/2946357736#Person/polychronakis_michalis_computer_scientist> ; # (Computer scientist) Michalis Polychronakis
    schema:editor <http://experiment.worldcat.org/entity/work/data/2946357736#Person/lewko_allison_bishop> ; # Allison Bishop Lewko
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2946357736> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2946357736#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/2946357736#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isSimilarTo <http://www.worldcat.org/oclc/930257890> ;
    schema:name "Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers"@en ;
    schema:productID "934798884" ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-28166-7> ;
    schema:url <https://grinnell.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://proxy.library.eiu.edu:2048/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <https://login.libproxy.noctrl.edu/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://proxy.artic.edu/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-319-28165-0> ;
    schema:url <https://proxy1.library.eiu.edu/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://proxy.ohiolink.edu:9099/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://proxy.lib.siu.edu/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <http://rave.ohiolink.edu/ebooks/ebc/9783319281667> ;
    schema:url <http://rwlib.neiu.edu:2048/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/book/10.1007/978-3-319-28166-7> ;
    schema:url <http://ezproxy.uis.edu:2048/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-319-28165-0> ;
    schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/978-3-319-28166-7> ;
    schema:url <http://er.llcc.edu:2048/login?url=http://link.springer.com/10.1007/978-3-319-28166-7> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-28166-7> ;
    schema:workExample <http://worldcat.org/isbn/9783319281667> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/934798884> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2946357736#Meeting/acns_conference_13th_2015_new_york_n_y> # ACNS (Conference) (13th : 2015 : New York, N.Y.)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/2946357736#Place/new_york_n_y> ; # New York, N.Y.)
    schema:name "ACNS (Conference) (13th : 2015 : New York, N.Y.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Person/kolesnikov_vladimir_computer_scientist> # (Computer scientist) Vladimir Kolesnikov
    a schema:Person ;
    schema:familyName "Kolesnikov" ;
    schema:givenName "Vladimir" ;
    schema:name "(Computer scientist) Vladimir Kolesnikov" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Person/lewko_allison_bishop> # Allison Bishop Lewko
    a schema:Person ;
    schema:familyName "Lewko" ;
    schema:givenName "Allison Bishop" ;
    schema:name "Allison Bishop Lewko" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Person/malkin_tal> # Tal Malkin
    a schema:Person ;
    schema:familyName "Malkin" ;
    schema:givenName "Tal" ;
    schema:name "Tal Malkin" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Person/polychronakis_michalis_computer_scientist> # (Computer scientist) Michalis Polychronakis
    a schema:Person ;
    schema:familyName "Polychronakis" ;
    schema:givenName "Michalis" ;
    schema:name "(Computer scientist) Michalis Polychronakis" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Place/new_york_n_y> # New York, N.Y.)
    a schema:Place ;
    schema:name "New York, N.Y.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/934798884> ; # Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/934798884> ; # Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/computers_and_society> # Computers and Society
    a schema:Intangible ;
    schema:name "Computers and Society"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/management_of_computing_and_information_systems> # Management of Computing and Information Systems
    a schema:Intangible ;
    schema:name "Management of Computing and Information Systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
    schema:name "Systems and Data Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2946357736#Topic/theory_of_computation> # Theory of Computation
    a schema:Intangible ;
    schema:name "Theory of Computation"@en ;
    .

<http://link.springer.com/10.1007/978-3-319-28166-7>
    rdfs:comment "Connect to resource" ;
    .

<http://proxy.lib.siu.edu/login?url=http://link.springer.com/10.1007/978-3-319-28166-7>
    rdfs:comment "Available to current SIUC students, faculty, and staff." ;
    .

<http://rave.ohiolink.edu/ebooks/ebc/9783319281667>
    rdfs:comment "Connect to resource" ;
    .

<http://worldcat.org/isbn/9783319281667>
    a schema:ProductModel ;
    schema:isbn "3319281666" ;
    schema:isbn "9783319281667" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/934798884> ; # Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/930257890>
    a schema:CreativeWork ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/934798884> ; # Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers
    .

<http://www.worldcat.org/title/-/oclc/934798884>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/934798884> ; # Applied cryptography and network security : 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, revised selected papers
    schema:dateModified "2018-02-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.