000 | 03199nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-54770-6 | ||
003 | DE-He213 | ||
005 | 20240730171436.0 | ||
007 | cr nn 008mamaa | ||
008 | 240229s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031547706 _9978-3-031-54770-6 |
||
024 | 7 |
_a10.1007/978-3-031-54770-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aApplied Cryptography and Network Security _h[electronic resource] : _b22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I / _cedited by Christina Pöpper, Lejla Batina. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXXVIII, 489 p. 94 illus., 12 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14583 |
|
520 | _aThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aApplication software. _998595 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _998597 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
700 | 1 |
_aPöpper, Christina. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998599 |
|
700 | 1 |
_aBatina, Lejla. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998600 |
|
710 | 2 |
_aSpringerLink (Online service) _998602 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031547690 |
776 | 0 | 8 |
_iPrinted edition: _z9783031547713 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14583 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-54770-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c87588 _d87588 |