- Table View
- List View
Applied Concept Mapping: Capturing, Analyzing, and Organizing Knowledge
by Joseph D. Novak Robert R. Hoffman Brian M. Moon Alberto J. CañasThe expanding application of Concept Mapping includes its role in knowledge elicitation, institutional memory preservation, and ideation. With the advent of the CmapTools knowledge modeling software kit, Concept Mapping is being applied with increased frequency and success to address a variety of problems in the workplace.Supported by business appl
Applied Cryptography and Network Security: 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13269)
by Giuseppe Ateniese Daniele VenturiThe LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 174 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part I (Lecture Notes in Computer Science #13905)
by XiaoFeng Wang Mehdi TibouchiThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.
Applied Cryptography and Network Security Workshops: ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11605)
by Lingyu Wang Jianying Zhou Zhou Li Robert Deng Weizhi Meng Suryadipta Majumdar Kehuan ZhangThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops:AIBlock 2019: First International Workshop on Application Intelligence and Blockchain SecurityAIoTS 2019:First International Workshop on Articial Intelligence and Industrial Internet-of-Things SecurityCloud S&P 2019:First International Workshop on Cloud Security and PrivacyPriDA 2019:First InternationalWorkshop on Privacy-preserving Distributed Data AnalysisSiMLA 2019: First International Workshop on Security in Machine Learning and its Applications
Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings (Lecture Notes in Computer Science #12418)
by Cong Wang Mauro Conti Jianying Zhou Zhou Li Man Ho Au Weizhi Meng Martín Ochoa Suryadipta Majumdar Kehuan Zhang Georgios Portokalidis Lejla Batina Chuadhry Mujeeb Ahmed Jingqiang Lin Eleonora Losiouk Bo Luo Stjepan PicekThis book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020:Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020:First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020:Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020:Second International Workshop on Cloud Security and Privacy SCI 2020:First International Workshop on Secure Cryptographic Implementation SecMT 2020:First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications
Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21–24, 2021, Proceedings (Lecture Notes in Computer Science #12809)
by Cong Wang Jianying Zhou Chunhua Su Weizhi Meng Suryadipta Majumdar Lejla Batina Chuadhry Mujeeb Ahmed Jingqiang Lin Eleonora Losiouk Bo Luo Stjepan Picek Olga Gadyatskaya Sudipta Chattopadhyay Chenglu Jin Mihalis Maniatakos Daisuke Mashima Masaki ShimaokaThis book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops: AIBlock 2021: Third International Workshop on Application Intelligence and Blockchain Security AIHWS 2021: Second International Workshop on Artificial Intelligence in Hardware Security AIoTS 2021: Third International Workshop on Artificial Intelligence and Industrial IoT Security CIMSS 2021: First International Workshop on Critical Infrastructure and Manufacturing System Security Cloud S&P 2021: Third International Workshop on Cloud Security and Privacy SCI 2021: Second International Workshop on Secure Cryptographic Implementation SecMT 2021: Second International Workshop on Security in Mobile Technologies SiMLA 2021; Third International Workshop on Security in Machine Learning and its ApplicationsDue to the Corona pandemic the workshop was held as a virtual event.
Applied Cryptography and Network Security Workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings (Lecture Notes in Computer Science #13285)
by Cong Wang Jianying Zhou Chunhua Su Cristina Alcaraz Emiliano Casalicchio Weizhi Meng Jun Shao Suryadipta Majumdar Lejla Batina Jingqiang Lin Eleonora Losiouk Stjepan Picek Sudipta Chattopadhyay Chenglu Jin Sridhar Adepu Yury Zhauniarovich Saman ZonouzThis book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops:– AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security– AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security– AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security– CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security– Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy– SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation– SecMT: 3rd ACNS Workshop on Security in Mobile Technologies– SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications
Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings (Lecture Notes in Computer Science #13907)
by Cong Wang Mohammad Ashiqur Rahman Jianying Zhou Chunhua Su Weizhi Meng Jun Shao Suryadipta Majumdar Lejla Batina Leo Zhang Jingqiang Lin Eleonora Losiouk Stjepan Picek Daisuke Mashima Masaki Shimaoka Yury Zhauniarovich Zengpeng Li Ezekiel Soremekun Je Sen Teh Aleksei UdovenkoThis book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14586)
by Martin AndreoniThis two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).
Applied Cryptography and Network Security Workshops: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14587)
by Martin AndreoniThis two-volume set LNCS 14586-14587 constitutes the proceedings of eight Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, held in Abhu Dabhi, United Arab Emirates, during March 5-8, 2024. The 33 full papers and 11 poster papers presented in this volume were carefully reviewed and selected from 62 submissions. They stem from the following workshops: 6th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2024). 5th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2024). 6th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2024). 5th ACNS Workshop on Secure Cryptographic Implementation (SCI 2024). 1st Workshop on Advances in Asymmetric Cryptanalysis (AAC 2024). 6th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2024). 1st Workshop on Low-Latency Encryption (LLE 2024). 4th ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2024).
Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9092)
by Tal Malkin Vladimir Kolesnikov Allison Bishop Lewko Michalis PolychronakisThis book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.
Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Lecture Notes in Computer Science #9696)
by Ahmad-Reza Sadeghi Mark Manulis Steve SchneiderThis book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions. ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Lecture Notes in Computer Science #10355)
by Atsuko Miyaji Dieter Gollmann Hiroaki KikuchiThis book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.
Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Lecture Notes in Computer Science #10892)
by Bart Preneel Frederik VercauterenThis book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.
Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings (Lecture Notes in Computer Science #11464)
by Moti Yung Robert H. Deng Valérie Gauthier-Umaña Martín OchoaThis book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12146)
by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo SpognardiThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12147)
by Mauro Conti Jianying Zhou Emiliano Casalicchio Angelo SpognardiThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12726)
by Kazue Sako Nils Ole TippenhauerThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Applied Cryptography and Network Security: 19th International Conference, ACNS 2021, Kamakura, Japan, June 21–24, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12727)
by Kazue Sako Nils Ole TippenhauerThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.
Applied Cryptography and Network Security: 21st International Conference, ACNS 2023, Kyoto, Japan, June 19–22, 2023, Proceedings, Part II (Lecture Notes in Computer Science #13906)
by XiaoFeng Wang Mehdi TibouchiThe LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023. The 53 full papers included in these proceedings were carefully reviewed and selected from a total of 263 submissions. They are organized in topical sections as follows: Part I: side-channel and fault attacks; symmetric cryptanalysis; web security; elliptic curves and pairings; homomorphic cryptography; machine learning; and lattices and codes. Part II: embedded security; privacy-preserving protocols; isogeny-based cryptography; encryption; advanced primitives; multiparty computation; and Blockchain.
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14583)
by Lejla Batina Christina PöpperThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14584)
by Lejla Batina Christina PöpperThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III (Lecture Notes in Computer Science #14585)
by Lejla Batina Christina PöpperThe 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024, which took place in Abu Dhabi, UAE, in March 2024. The 54 full papers included in these proceedings were carefully reviewed and selected from 230 submissions. They have been organized in topical sections as follows: Part I: Cryptographic protocols; encrypted data; signatures; Part II: Post-quantum; lattices; wireless and networks; privacy and homomorphic encryption; symmetric crypto; Part III: Blockchain; smart infrastructures, systems and software; attacks; users and usability.
Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15826)
by Marc Fischlin Veelasha MoonsamyThis three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
by Stephen HauntsBenefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you’ll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects.What You'll LearnGet an introduction to the principles of encryptionUnderstand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signaturesCombine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiationUse Microsoft's Azure Key Vault to securely store encryption keys and secretsBuild real-world code to use in your own projectsWho This Book Is ForSoftware developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed.