000 | 03095nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-54773-7 | ||
003 | DE-He213 | ||
005 | 20240423130328.0 | ||
007 | cr nn 008mamaa | ||
008 | 240229s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031547737 _9978-3-031-54773-7 |
||
024 | 7 |
_a10.1007/978-3-031-54773-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aApplied Cryptography and Network Security _h[electronic resource] : _b22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / _cedited by Christina Pöpper, Lejla Batina. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXXIII, 509 p. 118 illus., 69 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14584 |
|
520 | _aThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aApplication software. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aSecurity Services. |
700 | 1 |
_aPöpper, Christina. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aBatina, Lejla. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031547720 |
776 | 0 | 8 |
_iPrinted edition: _z9783031547744 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14584 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-54773-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c187406 _d187406 |