LEADER 03165nam 22007095 450 001 9910416079803321 005 20251107152125.0 010 $a3-030-57878-X 024 7 $a10.1007/978-3-030-57878-7 035 $a(CKB)4100000011401118 035 $a(MiAaPQ)EBC6321265 035 $a(DE-He213)978-3-030-57878-7 035 $a(PPN)256146292 035 $a(MiAaPQ)EBC6321221 035 $a(EXLCZ)994100000011401118 100 $a20200828d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e18th International Conference, ACNS 2020, Rome, Italy, October 19?22, 2020, Proceedings, Part II /$fedited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (489 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12147 311 08$a3-030-57877-1 330 $aThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12147 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aComputer Engineering and Networks 606 $aComputing Milieux 615 0$aData protection. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 676 $a005.82 676 $a005.824 702 $aConti$b Mauro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCasalicchio$b Emiliano$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSpognardi$b Angelo$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910416079803321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA