FEEDBACK Smiley face
Normal view MARC view ISBD view

Pairing-Based Cryptography – Pairing 2013 [electronic resource] :6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers /

Contributor(s): Cao, Zhenfu [editor.] | Zhang, Fangguo [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 8365Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014.Description: X, 251 p. 10 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319048734.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Coding theory | Computers | Computer Science | Data Encryption | Systems and Data Security | Coding and Information Theory | Theory of ComputationOnline resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in