LEADER 04088nam 22007455 450 001 9910337853103321 005 20200706210422.0 010 $a3-030-21568-7 024 7 $a10.1007/978-3-030-21568-2 035 $a(CKB)4100000008347175 035 $a(DE-He213)978-3-030-21568-2 035 $a(MiAaPQ)EBC5922762 035 $a(PPN)236522280 035 $a(EXLCZ)994100000008347175 100 $a20190528d2019 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e17th International Conference, ACNS 2019, Bogota, Colombia, June 5?7, 2019, Proceedings /$fedited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11464 300 $aIncludes index. 311 $a3-030-21567-9 327 $aIntegrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques. 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques. 410 0$aSecurity and Cryptology ;$v11464 606 $aComputer security 606 $aComputer organization 606 $aComputers 606 $aData structures (Computer science) 606 $aSoftware engineering 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 615 0$aComputer security. 615 0$aComputer organization. 615 0$aComputers. 615 0$aData structures (Computer science). 615 0$aSoftware engineering. 615 14$aSystems and Data Security. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputing Milieux. 615 24$aData Structures and Information Theory. 615 24$aInformation Systems and Communication Service. 615 24$aSoftware Engineering/Programming and Operating Systems. 676 $a005.82 676 $a005.82 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGauthier-Umaña$b Valérie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOchoa$b Martín$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337853103321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA