Amazon cover image
Image from Amazon.com

Cryptology and network security : 23rd international conference, CANS 2024, Cambridge, UK, September 24-27, 2024, proceedings. Part I / Markulf Kohlweiss, Roberto Di Pietro, Alastair Beresford, editors.

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 14905.Publisher: Singapore : Springer, [2025]Copyright date: ©2025Description: 1 online resource (xxii, 316 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789819780136
  • 9819780136
Other title:
  • CANS 2024
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleDDC classification:
  • 005.8/24 23/eng/20241010
LOC classification:
  • QA76.9.A25 I58 2024eb
Online resources: Summary: This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections:- Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis. .
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

International conference proceedings.

Includes author index.

This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections:- Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis. .

Online resource; title from PDF title page (SpringerLink, viewed October 10, 2024).

Powered by Koha