Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12418)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security
Conference proceedings info: ACNS 2020.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (31 papers)
-
Front Matter
-
AIBlock – Application Intelligence and Blockchain Security
-
Front Matter
-
-
AIHWS – Artificial Intelligence in Hardware Security
-
Front Matter
-
-
AIoTS – Artificial Intelligence and Industrial IoT Security
-
Front Matter
-
Other Volumes
-
Applied Cryptography and Network Security Workshops
About this book
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020.
The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops:
AIBlock 2020:
Second International Workshop on Application Intelligence and Blockchain Security
AIHWS 2020:
First International Workshop on Artificial Intelligence in Hardware Security
AIoTS 2020:
Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security
Cloud S&P 2020:
Second International Workshop on Cloud Security and Privacy
SCI 2020:
First International Workshop on Secure Cryptographic Implementation
SecMT 2020:
First International Workshop on Security in Mobile Technologies
SiMLA 2020:
Second International Workshop on Security in Machine Learning and its Applications
Keywords
- access control
- artificial intelligence
- authentication
- communication systems
- computer hardware
- computer security
- cryptography
- data communication systems
- data security
- network protocols
- network security
- parallel processing systems
- privacy
- signal processing
- software architecture
- software design
- software engineering
- telecommunication networks
- telecommunication systems
- wireless telecommunication systems
Editors and Affiliations
-
Singapore University of Technology and Design, Singapore, Singapore
Jianying Zhou, Chuadhry Mujeeb Ahmed
-
University of Padua, Padua, Italy
Mauro Conti, Eleonora Losiouk
-
The University of Hong Kong, Hong Kong, Hong Kong
Man Ho Au
-
ICIS, Radboud University Nijmegen, Nijmegen, The Netherlands
Lejla Batina
-
University of California, Irvine, USA
Zhou Li
-
University of Science and Technology of China, Hefei, China
Jingqiang Lin
-
University of Kansas, Lawrence, USA
Bo Luo
-
CIISE, Concordia University, Montréal, Canada
Suryadipta Majumdar
-
Technical University of Denmark, Lyngby, Denmark
Weizhi Meng
-
AppGate Inc., Bogotá, Colombia
Martín Ochoa
-
Delft University of Technology, Delft, The Netherlands
Stjepan Picek
-
Stevens Institute of Technology, Hoboken, USA
Georgios Portokalidis
-
City University of Hong Kong, Hong Kong, China
Cong Wang
-
Chinese University of Hong Kong, Shatin, Hong Kong
Kehuan Zhang
Bibliographic Information
Book Title: Applied Cryptography and Network Security Workshops
Book Subtitle: ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19–22, 2020, Proceedings
Editors: Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, … Kehuan Zhang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-61638-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2020
Softcover ISBN: 978-3-030-61637-3Published: 14 October 2020
eBook ISBN: 978-3-030-61638-0Published: 14 October 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVII, 584
Number of Illustrations: 63 b/w illustrations, 115 illustrations in colour
Topics: Systems and Data Security, Computer Systems Organization and Communication Networks, Data Structures and Information Theory, Artificial Intelligence, Computing Milieux, Cryptology