Cryptology and Network Security: 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, Proceedings

Author:   Alastair R. Beresford ,  Arpita Patra ,  Emanuele Bellini
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13641
ISBN:  

9783031209734


Pages:   391
Publication Date:   11 November 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $168.16 Quantity:  
Add to Cart

Share |

Cryptology and Network Security: 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13–16, 2022, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Alastair R. Beresford ,  Arpita Patra ,  Emanuele Bellini
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13641
Weight:   0.623kg
ISBN:  

9783031209734


ISBN 10:   3031209737
Pages:   391
Publication Date:   11 November 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Zero-knowledge and MPC.- Efficient NIZK Arguments with Straight-Line Simulation and Extraction.- Updatable NIZKs from Non-Interactive Zaps.- Through the Looking-Glass: Benchmarking Secure Multi-Party Computation Comparisons for ReLU's.- Public-key Infrastructure.- Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS.- Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use.- Auditable Asymmetric Password Authenticated Public Key Establishment.- (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard.- Attacks and Countermeasures.- Passive Triangulation Attack on ORide.- HyperDetector: Detecting, Isolating, and Mitigating Timing Attacks in Virtualized Environments.- Cryptanalysis and Provable Security.- The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN.- How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh.- Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.- Provable Security of HADES Structure.- Cryptographic Protocols.- Practical Single-pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters.- Anonymous Random Allocation and Its Applications.- ACDC: Anonymous Crowdsourcing using Digital Cash.- Blockchain and Payment Systems.- Analyzing Price Deviations in DeFi Oracles.- Redacting Blockchain without Exposing Chameleon Hash Collisions.- Codes and Post-Quantum Cryptography.- Efficient Proofs of Retrievability using Expander Codes.- Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List