My Account Log in

1 option

Applied Cryptography and Network Security : 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I / edited by Kazue Sako, Nils Ole Tippenhauer.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Sako, Kazue., Editor.
Tippenhauer, Nils Ole, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 12726
Security and Cryptology ; 12726
Language:
English
Subjects (All):
Data protection.
Computer engineering.
Computer networks.
Coding theory.
Information theory.
Application software.
Operating systems (Computers).
Data and Information Security.
Computer Engineering and Networks.
Coding and Information Theory.
Computer and Information Systems Applications.
Operating Systems.
Local Subjects:
Data and Information Security.
Computer Engineering and Networks.
Coding and Information Theory.
Computer and Information Systems Applications.
Operating Systems.
Physical Description:
1 online resource (XIV, 482 pages) : 72 illustrations, 21 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Contents:
Cryptographic Protocols
Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
Analysis of Client-side Security for Long-term Time-stamping Services
Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves
Secure and Fair Protocols
CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning
Blind Polynomial Evaluation and Data Trading
Coin-Based Multi-Party Fair Exchange
Cryptocurrency and Smart Contracts
P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
Digital Signatures
Unlinkable and Invisible -Sanitizable Signatures
Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
An Efficient Certificate-Based Signature Scheme in the Standard Model
Embedded System Security
SnakeGX: a sneaky attack against SGX Enclaves
Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems
Lattice Cryptography
Access Control Encryption from Group Encryption
Password Protected Secret Sharing from Lattices
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts.
Other Format:
Printed edition:
ISBN:
978-3-030-78372-3
9783030783723
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account