LEADER 03527nam 22007815 450 001 9910349274903321 005 20251225200458.0 010 $a3-030-31578-9 024 7 $a10.1007/978-3-030-31578-8 035 $a(CKB)4100000009522857 035 $a(DE-He213)978-3-030-31578-8 035 $a(MiAaPQ)EBC5968200 035 $a(PPN)255120435 035 $a(EXLCZ)994100000009522857 100 $a20190927d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptology and Network Security $e18th International Conference, CANS 2019, Fuzhou, China, October 25?27, 2019, Proceedings /$fedited by Yi Mu, Robert H. Deng, Xinyi Huang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11829 300 $aIncludes index. 311 08$a3-030-31577-0 327 $aHomomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization. 330 $aThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11829 606 $aCryptography 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aData mining 606 $aComputers, Special purpose 606 $aComputer networks 606 $aCryptology 606 $aSoftware Engineering 606 $aArtificial Intelligence 606 $aData Mining and Knowledge Discovery 606 $aSpecial Purpose and Application-Based Systems 606 $aComputer Communication Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aData mining. 615 0$aComputers, Special purpose. 615 0$aComputer networks. 615 14$aCryptology. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aData Mining and Knowledge Discovery. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 676 $a005.82 676 $a005.824 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Xinyi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349274903321 996 $aCryptology and Network Security$92968064 997 $aUNINA