1 option
Applied Cryptography and Network Security : 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I / edited by Kazue Sako, Nils Ole Tippenhauer.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 12726
- Security and Cryptology ; 12726
- Language:
- English
- Subjects (All):
- Data protection.
- Computer engineering.
- Computer networks.
- Coding theory.
- Information theory.
- Application software.
- Operating systems (Computers).
- Data and Information Security.
- Computer Engineering and Networks.
- Coding and Information Theory.
- Computer and Information Systems Applications.
- Operating Systems.
- Local Subjects:
- Data and Information Security.
- Computer Engineering and Networks.
- Coding and Information Theory.
- Computer and Information Systems Applications.
- Operating Systems.
- Physical Description:
- 1 online resource (XIV, 482 pages) : 72 illustrations, 21 illustrations in color.
- Edition:
- 1st ed. 2021.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2021.
- System Details:
- text file PDF
- Summary:
- The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
- Contents:
- Cryptographic Protocols
- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
- Analysis of Client-side Security for Long-term Time-stamping Services
- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves
- Secure and Fair Protocols
- CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning
- Blind Polynomial Evaluation and Data Trading
- Coin-Based Multi-Party Fair Exchange
- Cryptocurrency and Smart Contracts
- P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange
- WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets
- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
- Digital Signatures
- Unlinkable and Invisible -Sanitizable Signatures
- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More
- An Efficient Certificate-Based Signature Scheme in the Standard Model
- Embedded System Security
- SnakeGX: a sneaky attack against SGX Enclaves
- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks
- Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems
- Lattice Cryptography
- Access Control Encryption from Group Encryption
- Password Protected Secret Sharing from Lattices
- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-030-78372-3
- 9783030783723
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.