Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 14584)
Included in the following conference series:
Conference proceedings info: ACNS 2024.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows:
Part I: Cryptographic protocols; encrypted data; signatures;
Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto;
Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Keywords
- artificial intelligence
- authentication
- computer hardware
- computer networks
- computer science
- computer security
- computer systems
- cryptography
- data security
- distributed computer systems
- distributed systems
- engineering
- internet
- mathematics
- network protocols
- network security
- parallel processing systems
- privacy
- public key cryptography
- signal processing
Table of contents (19 papers)
-
Post-quantum
-
Cryptographic Protocols II
-
Wireless and Networks
-
Privacy and Homomorphic Encryption
Other volumes
Editors and Affiliations
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II
Editors: Christina Pöpper, Lejla Batina
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-54773-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2024
Softcover ISBN: 978-3-031-54772-0Published: 01 March 2024
eBook ISBN: 978-3-031-54773-7Published: 29 February 2024
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXIII, 509
Number of Illustrations: 49 b/w illustrations, 69 illustrations in colour
Topics: Systems and Data Security, Data Structures and Information Theory, Operating Systems, Computer Applications, Cryptology, Security Services