Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings /
Security Standardisation Research Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5–6, 2016, Proceedings / [electronic resource] :
edited by Lidong Chen, David McGrew, Chris Mitchell.
- 1st ed. 2016.
- IX, 275 p. 64 illus. online resource.
- Security and Cryptology, 10074 2946-1863 ; .
- Security and Cryptology, 10074 .
Security Standardisation Research -- Hash-based Signatures -- Algorithm agility -- Secure protocols. Access Control. Secure APIs -- Payment security -- Key distribution.
This book constitutes the refereed proceedings of the Third International Conference on Security Standardisation Research, SSR 2016, held in Gaithersburg, MD, USA, in December 2016. The accepted papers cover a range of topics in the field of security standardisation research, including hash-based signatures, algorithm agility, secure protocols, access control, secure APIs, payment security and key distribution.
9783319491004
10.1007/978-3-319-49100-4 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks .
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Data and Information Security.
Cryptology.
Computer Communication Networks.
IT Operations.
Algorithms.
Computers and Society.
QA76.9.A25
005.8
Security Standardisation Research -- Hash-based Signatures -- Algorithm agility -- Secure protocols. Access Control. Secure APIs -- Payment security -- Key distribution.
This book constitutes the refereed proceedings of the Third International Conference on Security Standardisation Research, SSR 2016, held in Gaithersburg, MD, USA, in December 2016. The accepted papers cover a range of topics in the field of security standardisation research, including hash-based signatures, algorithm agility, secure protocols, access control, secure APIs, payment security and key distribution.
9783319491004
10.1007/978-3-319-49100-4 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks .
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Data and Information Security.
Cryptology.
Computer Communication Networks.
IT Operations.
Algorithms.
Computers and Society.
QA76.9.A25
005.8