Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 15827)
Included in the following conference series:
Conference proceedings info: ACNS 2025.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.
Similar content being viewed by others
Keywords
Table of contents (15 papers)
-
Biometrics and Authentication
-
Privacy
-
Machine Learning
Other volumes
-
Applied Cryptography and Network Security
-
Applied Cryptography and Network Security
-
Applied Cryptography and Network Security
Editors and Affiliations
Accessibility Information
PDF accessibility summary
EPUB accessibility summary
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 23rd International Conference, ACNS 2025, Munich, Germany, June 23–26, 2025, Proceedings, Part III
Editors: Marc Fischlin, Veelasha Moonsamy
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-95767-3
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2025
Softcover ISBN: 978-3-031-95766-6Published: 20 June 2025
eBook ISBN: 978-3-031-95767-3Published: 19 June 2025
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 417
Number of Illustrations: 13 b/w illustrations, 87 illustrations in colour
Topics: Systems and Data Security, Data Structures and Information Theory, Operating Systems, Computer Applications, Cryptology, Security Services