03336nam 22006375 450 99641831070331620200826224644.03-030-57808-910.1007/978-3-030-57808-4(CKB)4100000011401117(MiAaPQ)EBC6319912(DE-He213)978-3-030-57808-4(PPN)254663656(EXLCZ)99410000001140111720200826d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierApplied Cryptography and Network Security[electronic resource] 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I /edited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (xix, 504 pages) illustrationsSecurity and Cryptology ;121463-030-57807-0 This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.Security and Cryptology ;12146Computer securityComputer organizationData structures (Computer science)ComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Computing Milieuxhttps://scigraph.springernature.com/ontologies/product-market-codes/I24008Computer security.Computer organization.Data structures (Computer science).Computers.Systems and Data Security.Computer Systems Organization and Communication Networks.Data Structures and Information Theory.Computing Milieux.005.82Conti Mauroedthttp://id.loc.gov/vocabulary/relators/edtZhou Jianyingedthttp://id.loc.gov/vocabulary/relators/edtCasalicchio Emilianoedthttp://id.loc.gov/vocabulary/relators/edtSpognardi Angeloedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418310703316Applied Cryptography and Network Security771881UNISA