LEADER 03992nam 22007575 450 001 9910349274903321 005 20200704171926.0 010 $a3-030-31578-9 024 7 $a10.1007/978-3-030-31578-8 035 $a(CKB)4100000009522857 035 $a(DE-He213)978-3-030-31578-8 035 $a(MiAaPQ)EBC5968200 035 $a(PPN)255120435 035 $a(EXLCZ)994100000009522857 100 $a20190927d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptology and Network Security $e18th International Conference, CANS 2019, Fuzhou, China, October 25?27, 2019, Proceedings /$fedited by Yi Mu, Robert H. Deng, Xinyi Huang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIII, 540 p. 388 illus., 61 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11829 300 $aIncludes index. 311 $a3-030-31577-0 327 $aHomomorphic Encryption -- SIKE and Hash -- Lattice and Post-quantum Cryptography -- Searchable Encryption -- Blockchains, Cloud Security -- Secret Sharing and Interval Test -- LWE -- Encryption, Data Aggregation, and Revocation -- Signature, ML, Payment, and Factorization. 330 $aThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019. The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization. 410 0$aSecurity and Cryptology ;$v11829 606 $aData encryption (Computer science) 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aData mining 606 $aSpecial purpose computers 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aData mining. 615 0$aSpecial purpose computers. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aSoftware Engineering/Programming and Operating Systems. 615 24$aArtificial Intelligence. 615 24$aData Mining and Knowledge Discovery. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer Communication Networks. 676 $a005.82 676 $a005.824 702 $aMu$b Yi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Xinyi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349274903321 996 $aCryptology and Network Security$92968064 997 $aUNINA