|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910337853103321 |
|
|
Titolo |
Applied Cryptography and Network Security : 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings / / edited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 11464 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computer organization |
Computers |
Data structures (Computer science) |
Software engineering |
Systems and Data Security |
Computer Systems Organization and Communication Networks |
Computing Milieux |
Data Structures and Information Theory |
Information Systems and Communication Service |
Software Engineering/Programming and Operating Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections |
|
|
|
|
|
|
|
|
|
|
named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques. |
|
|
|
|
|
| |