Cryptology and network security : 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010 : proceedings /

Saved in:
Bibliographic Details
Meeting name:International Conference on Cryptology and Network Security (9th : 2010 : Kuala Lampur, Malaysia)
Imprint:Berlin : Springer, 2010.
Description:1 online resource (xiii, 353 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 6467
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6467.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11075202
Hidden Bibliographic Details
Varying Form of Title:CANS 2010
Other authors / contributors:Heng, Swee-Huay.
Wright, Rebecca N., 1967-
Goi, Bok-Min.
ISBN:9783642176197
3642176194
9783642176180
3642176186
Notes:Includes bibliographical references and index.
Print version record.
Summary:This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Network Security, CANS 2010, held in Kuala Lumpur, Malaysia, in December 2010. The 21 revised full papers, presented together with abstracts of 2 invited talks, were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on block ciphers, wireless network security, hash functions, public key cryptography, secure mechanisms, cryptographic protocols, and anonymous credentials.
Other form:Print version: Cryptology and network security. Berlin : Springer, 2010 9783642176180
Description
Summary:The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who assisted with reviewing and the CANS Steering Committee for their help. We thank Shai Halevi for use of his Web-Submission-and-Review software that was used for the electronic s- mission and review of the submitted papers, and we thank the International Association for Cryptologic Research (IACR) for Web hosting of the software.
Physical Description:1 online resource (xiii, 353 pages) : illustrations.
Bibliography:Includes bibliographical references and index.
ISBN:9783642176197
3642176194
9783642176180
3642176186
ISSN:0302-9743
;