LEADER 03336nam 22006375 450 001 996418310703316 005 20200826224644.0 010 $a3-030-57808-9 024 7 $a10.1007/978-3-030-57808-4 035 $a(CKB)4100000011401117 035 $a(MiAaPQ)EBC6319912 035 $a(DE-He213)978-3-030-57808-4 035 $a(PPN)254663656 035 $a(EXLCZ)994100000011401117 100 $a20200826d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security$b[electronic resource] $e18th International Conference, ACNS 2020, Rome, Italy, October 19?22, 2020, Proceedings, Part I /$fedited by Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (xix, 504 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v12146 311 $a3-030-57807-0 330 $aThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography. 410 0$aSecurity and Cryptology ;$v12146 606 $aComputer security 606 $aComputer organization 606 $aData structures (Computer science) 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 615 0$aComputer security. 615 0$aComputer organization. 615 0$aData structures (Computer science). 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aData Structures and Information Theory. 615 24$aComputing Milieux. 676 $a005.82 702 $aConti$b Mauro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCasalicchio$b Emiliano$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSpognardi$b Angelo$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418310703316 996 $aApplied Cryptography and Network Security$9771881 997 $aUNISA