|
|
|
|
LEADER |
03648nmm a2200397 u 4500 |
001 |
EB001994105 |
003 |
EBX01000000000000001157007 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210702 ||| eng |
020 |
|
|
|a 9783030783754
|
100 |
1 |
|
|a Sako, Kazue
|e [editor]
|
245 |
0 |
0 |
|a Applied Cryptography and Network Security
|h Elektronische Ressource
|b 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II
|c edited by Kazue Sako, Nils Ole Tippenhauer
|
250 |
|
|
|a 1st ed. 2021
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2021, 2021
|
300 |
|
|
|a XIV, 512 p. 125 illus., 77 illus. in color
|b online resource
|
505 |
0 |
|
|a Analysis of Applied Systems -- Breaking and Fixing Third-Party Payment Service for Mobile Apps -- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing -- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library -- Secure Computations -- Privacy-Preserving Data Aggregation with Probabilistic Range Validation -- LLVM-based Circuit Compilation for Practical Secure Computation -- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings -- Cryptanalysis -- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements -- Efficient Methods to Search for Best Differential Characteristics on SKINNY -- Towards Efficient LPN-Based Symmetric Encryption -- System Security -- A Differentially Private Hybrid Approach to Traffic Monitoring -- Proactive Detection of Phishing Kit Traffic -- Vestige: Identifying Binary Code Provenance for Vulnerability Detection -- SoK: Auditability and Accountability in DistributedPayment Systems -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms -- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols -- Improved Structured Encryption for SQL Databases via Hybrid Indexing.
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Mobile and Network Security
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Tippenhauer, Nils Ole
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-78375-4
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-78375-4?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications
|