Normal view MARC view ISBD view

Pairing-Based Cryptography – Pairing 2013 [electronic resource] : 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers / edited by Zhenfu Cao, Fangguo Zhang.

By: Cao, Zhenfu [editor.].
Contributor(s): Zhang, Fangguo [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 8365Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014Description: X, 251 p. 10 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319048734.Subject(s): Computer science | Data protection | Data encryption (Computer science) | Coding theory | Information theory | Computer Science | Data Encryption | Systems and Data Security | Coding and Information Theory | Theory of ComputationDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue