Applied Cryptography and Network Security [electronic resource] : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III / edited by Christina Pöpper, Lejla Batina.
Contributor(s): Pöpper, Christina [editor.] | Batina, Lejla [editor.] | SpringerLink (Online service).
Material type: BookSeries: Lecture Notes in Computer Science: 14585Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: XXII, 463 p. 140 illus., 94 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031547768.Subject(s): Data protection | Data structures (Computer science) | Information theory | Operating systems (Computers) | Application software | Cryptography | Data encryption (Computer science) | Data and Information Security | Data Structures and Information Theory | Operating Systems | Computer and Information Systems Applications | Cryptology | Security ServicesAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
There are no comments for this item.