LEADER 03656nam 22007935 450 001 9910337853103321 005 20251225194933.0 010 $a3-030-21568-7 024 7 $a10.1007/978-3-030-21568-2 035 $a(CKB)4100000008347175 035 $a(DE-He213)978-3-030-21568-2 035 $a(MiAaPQ)EBC5922762 035 $a(PPN)236522280 035 $a(EXLCZ)994100000008347175 100 $a20190528d2019 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e17th International Conference, ACNS 2019, Bogota, Colombia, June 5?7, 2019, Proceedings /$fedited by Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 614 p. 704 illus., 57 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11464 300 $aIncludes index. 311 08$a3-030-21567-9 327 $aIntegrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory of Cryptographic Implementations -- Privacy Preserving Techniques. 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11464 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aData structures (Computer science) 606 $aInformation theory 606 $aSoftware engineering 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputing Milieux 606 $aData Structures and Information Theory 606 $aComputer Communication Networks 606 $aSoftware Engineering 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aSoftware engineering. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 615 24$aData Structures and Information Theory. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 676 $a005.82 676 $a005.82 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGauthier-Umaña$b Valérie$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOchoa$b Martín$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337853103321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA