03315nam 22006375 450 99641830980331620200828152258.03-030-57878-X10.1007/978-3-030-57878-7(CKB)4100000011401118(MiAaPQ)EBC6321265(DE-He213)978-3-030-57878-7(PPN)256146292(EXLCZ)99410000001140111820200828d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierApplied Cryptography and Network Security[electronic resource] 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II /edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (489 pages)Security and Cryptology ;121473-030-57877-1 This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.Security and Cryptology ;12147Computer securityData structures (Computer science)Computer organizationComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Computing Milieuxhttps://scigraph.springernature.com/ontologies/product-market-codes/I24008Computer security.Data structures (Computer science).Computer organization.Computers.Systems and Data Security.Data Structures and Information Theory.Computer Systems Organization and Communication Networks.Computing Milieux.005.82Conti Mauroedthttp://id.loc.gov/vocabulary/relators/edtZhou Jianyingedthttp://id.loc.gov/vocabulary/relators/edtCasalicchio Emilianoedthttp://id.loc.gov/vocabulary/relators/edtSpognardi Angeloedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418309803316Applied Cryptography and Network Security771881UNISA