iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://link.springer.com/doi/10.1007/978-3-319-48965-0
Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings | SpringerLink
Skip to main content

Cryptology and Network Security

15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

  • Conference proceedings
  • © 2016

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10052)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: CANS 2016.

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.

The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.




Similar content being viewed by others

Keywords

Table of contents (56 papers)

  1. Cryptanalysis of Symmetric Key

  2. SideChannel Attacks and Implementation

  3. Lattice-Based Cryptography

  4. Virtual Private Network

  5. Signatures and Hash

Other volumes

  1. Cryptology and Network Security

Editors and Affiliations

  • Università degli Studi di Milano, Crema, Italy

    Sara Foresti

  • Università degli Studi di Salerno, Fisciano, Italy

    Giuseppe Persiano

Bibliographic Information

Publish with us