Cryptology and network security : 21st international conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings / Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.).

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedin...

Full description

Saved in:
Bibliographic Details
Corporate Author: International Conference on Cryptology and Network Security Dubai, United Arab Emirates
Other Authors: Beresford, Alastair R. (Editor), Patra, Arpita (Editor), Bellini, Emanuele (Editor)
Format: eBook
Language:English
Published: Cham : Springer, [2022]
Series:Lecture notes in computer science ; 13641.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 on1350707879
003 OCoLC
005 20241006213017.0
006 m o d
007 cr cnu|||unuuu
008 221114s2022 sz a o 101 0 eng d
040 |a YDX  |b eng  |e rda  |e pn  |c YDX  |d GW5XE  |d EBLCP  |d OCLCF  |d UKAHL  |d OCLCQ  |d INT  |d OCLCO 
019 |a 1351197345  |a 1374607757 
020 |a 9783031209741  |q (electronic bk.) 
020 |a 3031209745  |q (electronic bk.) 
020 |z 9783031209734 
020 |z 3031209737 
020 |a 9788303120977  |q (1) 
020 |a 8303120972 
024 7 |a 10.1007/978-3-031-20974-1  |2 doi 
035 |a (OCoLC)1350707879  |z (OCoLC)1351197345  |z (OCoLC)1374607757 
050 4 |a QA76.9.A25  |b I58 2022 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
049 |a HCDD 
111 2 |a International Conference on Cryptology and Network Security  |n (21st :  |d 2022 :  |c Dubai, United Arab Emirates) 
245 1 0 |a Cryptology and network security :  |b 21st international conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings /  |c Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.). 
246 3 0 |a CANS 2022 
264 1 |a Cham :  |b Springer,  |c [2022] 
264 4 |c ©2022 
300 |a 1 online resource (xiii, 391 pages) :  |b illustrations (some color). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft  |0 http://rdaregistry.info/termList/fileType/1002 
490 1 |a Lecture notes in computer science,  |x 1611-3349 ;  |v 13641 
500 |a International conference proceedings. 
500 |a Includes author index. 
520 |a This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography. 
505 0 |a Zero-knowledge and MPC -- Efficient NIZK Arguments with Straight-Line Simulation and Extraction -- Updatable NIZKs from Non-Interactive Zaps -- Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLUs -- Public-key Infrastructure -- Oh SSH-it, whats my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS -- Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use -- Auditable Asymmetric Password Authenticated Public Key Establishment -- (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard -- Attacks and Countermeasures -- Passive Triangulation Attack on ORide -- HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments -- Cryptanalysis and Provable Security -- The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN -- How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh -- Cryptanalysis of the Multi-Power RSA Cryptosystem Variant -- Provable Security of HADES Structure -- Cryptographic Protocols -- Practical Single-pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters -- Anonymous Random Allocation and Its Applications -- ACDC: Anonymous Crowdsourcing using Digital Cash -- Blockchain and Payment Systems -- Analyzing Price Deviations in DeFi Oracles -- Redacting Blockchain without Exposing Chameleon Hash Collisions -- Codes and Post-Quantum Cryptography -- Efficient Proofs of Retrievability using Expander Codes -- Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed November 23, 2022). 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
655 7 |a proceedings (reports)  |2 aat 
655 7 |a Conference papers and proceedings  |2 fast 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Beresford, Alastair R.,  |e editor. 
700 1 |a Patra, Arpita,  |e editor. 
700 1 |a Bellini, Emanuele,  |e editor. 
776 0 8 |c Original  |z 3031209737  |z 9783031209734  |w (OCoLC)1347260680 
830 0 |a Lecture notes in computer science ;  |v 13641.  |x 1611-3349 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-031-20974-1  |y Click for online access 
903 |a SPRING-COMP2022 
994 |a 92  |b HCD