|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
on1350707879 |
003 |
OCoLC |
005 |
20241006213017.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
221114s2022 sz a o 101 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d GW5XE
|d EBLCP
|d OCLCF
|d UKAHL
|d OCLCQ
|d INT
|d OCLCO
|
019 |
|
|
|a 1351197345
|a 1374607757
|
020 |
|
|
|a 9783031209741
|q (electronic bk.)
|
020 |
|
|
|a 3031209745
|q (electronic bk.)
|
020 |
|
|
|z 9783031209734
|
020 |
|
|
|z 3031209737
|
020 |
|
|
|a 9788303120977
|q (1)
|
020 |
|
|
|a 8303120972
|
024 |
7 |
|
|a 10.1007/978-3-031-20974-1
|2 doi
|
035 |
|
|
|a (OCoLC)1350707879
|z (OCoLC)1351197345
|z (OCoLC)1374607757
|
050 |
|
4 |
|a QA76.9.A25
|b I58 2022
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
049 |
|
|
|a HCDD
|
111 |
2 |
|
|a International Conference on Cryptology and Network Security
|n (21st :
|d 2022 :
|c Dubai, United Arab Emirates)
|
245 |
1 |
0 |
|a Cryptology and network security :
|b 21st international conference, CANS 2022, Dubai, United Arab Emirates, November 13-16, 2022 : proceedings /
|c Alastair R. Beresford, Arpita Patra, Emanuele Bellini (eds.).
|
246 |
3 |
0 |
|a CANS 2022
|
264 |
|
1 |
|a Cham :
|b Springer,
|c [2022]
|
264 |
|
4 |
|c ©2022
|
300 |
|
|
|a 1 online resource (xiii, 391 pages) :
|b illustrations (some color).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rdaft
|0 http://rdaregistry.info/termList/fileType/1002
|
490 |
1 |
|
|a Lecture notes in computer science,
|x 1611-3349 ;
|v 13641
|
500 |
|
|
|a International conference proceedings.
|
500 |
|
|
|a Includes author index.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
|
505 |
0 |
|
|a Zero-knowledge and MPC -- Efficient NIZK Arguments with Straight-Line Simulation and Extraction -- Updatable NIZKs from Non-Interactive Zaps -- Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLUs -- Public-key Infrastructure -- Oh SSH-it, whats my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS -- Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use -- Auditable Asymmetric Password Authenticated Public Key Establishment -- (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard -- Attacks and Countermeasures -- Passive Triangulation Attack on ORide -- HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments -- Cryptanalysis and Provable Security -- The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN -- How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh -- Cryptanalysis of the Multi-Power RSA Cryptosystem Variant -- Provable Security of HADES Structure -- Cryptographic Protocols -- Practical Single-pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters -- Anonymous Random Allocation and Its Applications -- ACDC: Anonymous Crowdsourcing using Digital Cash -- Blockchain and Payment Systems -- Analyzing Price Deviations in DeFi Oracles -- Redacting Blockchain without Exposing Chameleon Hash Collisions -- Codes and Post-Quantum Cryptography -- Efficient Proofs of Retrievability using Expander Codes -- Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed November 23, 2022).
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Congresses.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
655 |
|
7 |
|a proceedings (reports)
|2 aat
|
655 |
|
7 |
|a Conference papers and proceedings
|2 fast
|
655 |
|
7 |
|a Conference papers and proceedings.
|2 lcgft
|
655 |
|
7 |
|a Actes de congrès.
|2 rvmgf
|
700 |
1 |
|
|a Beresford, Alastair R.,
|e editor.
|
700 |
1 |
|
|a Patra, Arpita,
|e editor.
|
700 |
1 |
|
|a Bellini, Emanuele,
|e editor.
|
776 |
0 |
8 |
|c Original
|z 3031209737
|z 9783031209734
|w (OCoLC)1347260680
|
830 |
|
0 |
|a Lecture notes in computer science ;
|v 13641.
|x 1611-3349
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-031-20974-1
|y Click for online access
|
903 |
|
|
|a SPRING-COMP2022
|
994 |
|
|
|a 92
|b HCD
|