Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13269)
Included in the following conference series:
Conference proceedings info: ACNS 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
Similar content being viewed by others
Keywords
- artificial intelligence
- authentication
- computer hardware
- computer networks
- computer science
- computer security
- computer systems
- cryptography
- data security
- distributed computer systems
- distributed systems
- engineering
- internet
- mathematics
- network protocols
- network security
- parallel processing systems
- privacy
- public key cryptography
- signal processing
Table of contents (44 papers)
-
Attacks
-
Cryptographic Protocols
Other volumes
-
Applied Cryptography and Network Security
-
Applied Cryptography and Network Security Workshops
Editors and Affiliations
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
Editors: Giuseppe Ateniese, Daniele Venturi
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-09234-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-031-09233-6Published: 18 June 2022
eBook ISBN: 978-3-031-09234-3Published: 17 June 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XV, 914
Number of Illustrations: 76 b/w illustrations, 78 illustrations in colour
Topics: Systems and Data Security, Data Structures and Information Theory, Operating Systems, Information Systems Applications (incl. Internet), Cryptology, Security Services