Security and Cryptography for Networks [electronic resource] : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings / edited by Vassilis Zikas, Roberto De Prisco.
Contributor(s): Zikas, Vassilis [editor.]
| De Prisco, Roberto [editor.]
| SpringerLink (Online service)
.
Material type: 









Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.
There are no comments for this item.