LEADER 04082nam 22007815 450 001 996465790403316 005 20200701063718.0 010 $a3-319-93387-6 024 7 $a10.1007/978-3-319-93387-0 035 $a(CKB)3810000000358668 035 $a(DE-He213)978-3-319-93387-0 035 $a(MiAaPQ)EBC6284682 035 $a(PPN)229494390 035 $a(EXLCZ)993810000000358668 100 $a20180609d2018 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security$b[electronic resource] $e16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings /$fedited by Bart Preneel, Frederik Vercauteren 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 716 p. 135 illus.) 225 1 $aSecurity and Cryptology ;$v10892 300 $aIncludes index. 311 $a3-319-93386-8 327 $aCryptographic Protocols -- Side Channel Attacks and Tamper Resistance -- Digital Signatures -- Privacy Preserving Computation -- Multi-party Computation -- Symmetric Key Primitives -- Symmetric Key Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud and Peer-to-peer Security. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security. 410 0$aSecurity and Cryptology ;$v10892 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.82 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVercauteren$b Frederik$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465790403316 996 $aApplied Cryptography and Network Security$9771881 997 $aUNISA