Overview
- Fast track conference proceedings
- Unique visibility
- State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7341)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ACNS 2012.
Buy print copy
About this book
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Similar content being viewed by others
Keywords
Table of contents (33 papers)
-
Key Management
-
Identity-Based Cryptography
-
Cryptographic Primitives
Other volumes
-
Applied Cryptography and Network Security
Editors and Affiliations
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings
Editors: Feng Bao, Pierangela Samarati, Jianying Zhou
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-31284-7
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2012
Softcover ISBN: 978-3-642-31283-0Published: 19 June 2012
eBook ISBN: 978-3-642-31284-7Published: 14 June 2012
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 580
Number of Illustrations: 107 b/w illustrations
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems, Computer Communication Networks, Coding and Information Theory, Data Structures