LEADER 03527nam 22008175 450 001 9910578688703321 005 20251113192549.0 010 $a3-031-09234-1 024 7 $a10.1007/978-3-031-09234-3 035 $a(MiAaPQ)EBC7018964 035 $a(Au-PeEL)EBL7018964 035 $a(CKB)23899478700041 035 $aEBL7018964 035 $a(AU-PeEL)EBL7018964 035 $a(PPN)268758247 035 $a(OCoLC)1333703191 035 $a(DE-He213)978-3-031-09234-3 035 $a(EXLCZ)9923899478700041 100 $a20220617d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security $e20th International Conference, ACNS 2022, Rome, Italy, June 20?23, 2022, Proceedings /$fedited by Giuseppe Ateniese, Daniele Venturi 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (916 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13269 300 $aIncludes index. 311 08$aPrint version: Ateniese, Giuseppe Applied Cryptography and Network Security Cham : Springer International Publishing AG,c2022 9783031092336 327 $aEncryption -- Attacks -- Cryptographic Protocols -- System Security -- Cryptographic Primitives -- MPC -- Blockchain -- Block-Cyphers -- Post-Quantum Cryptography. 330 $aThe LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13269 606 $aData protection 606 $aData structures (Computer science) 606 $aInformation theory 606 $aOperating systems (Computers) 606 $aApplication software 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aData Structures and Information Theory 606 $aOperating Systems 606 $aComputer and Information Systems Applications 606 $aCryptology 606 $aSecurity Services 615 0$aData protection. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aOperating systems (Computers) 615 0$aApplication software. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aData Structures and Information Theory. 615 24$aOperating Systems. 615 24$aComputer and Information Systems Applications. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a005.82 676 $a005.8 702 $aAteniese$b Giuseppe 702 $aVenturi$b Daniele 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910578688703321 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA