Information Security and Cryptology – ICISC 2016

Information Security and Cryptology – ICISC 2016
Author :
Publisher : Springer
Total Pages : 355
Release :
ISBN-10 : 9783319531779
ISBN-13 : 3319531778
Rating : 4/5 (79 Downloads)

Synopsis Information Security and Cryptology – ICISC 2016 by : Seokhie Hong

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.

Information Security and Cryptology – ICISC 2017

Information Security and Cryptology – ICISC 2017
Author :
Publisher : Springer
Total Pages : 372
Release :
ISBN-10 : 9783319785561
ISBN-13 : 3319785567
Rating : 4/5 (61 Downloads)

Synopsis Information Security and Cryptology – ICISC 2017 by : Howon Kim

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Information Security and Cryptology – ICISC 2018

Information Security and Cryptology – ICISC 2018
Author :
Publisher : Springer
Total Pages : 375
Release :
ISBN-10 : 9783030121464
ISBN-13 : 3030121461
Rating : 4/5 (64 Downloads)

Synopsis Information Security and Cryptology – ICISC 2018 by : Kwangsu Lee

This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Information Security and Cryptology – ICISC 2022

Information Security and Cryptology – ICISC 2022
Author :
Publisher : Springer Nature
Total Pages : 514
Release :
ISBN-10 : 9783031293719
ISBN-13 : 3031293711
Rating : 4/5 (19 Downloads)

Synopsis Information Security and Cryptology – ICISC 2022 by : Seung-Hyun Seo

This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022. The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: ​Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.

Information Security and Cryptology – ICISC 2021

Information Security and Cryptology – ICISC 2021
Author :
Publisher : Springer Nature
Total Pages : 439
Release :
ISBN-10 : 9783031088964
ISBN-13 : 3031088964
Rating : 4/5 (64 Downloads)

Synopsis Information Security and Cryptology – ICISC 2021 by : Jong Hwan Park

This book constitutes selected papers from the 24th International Conference on Information Security and Cryptology, ICISC 2021, held in Seoul, South Korea, in December 2021. The total of 23 papers presented in this volume were carefully reviewed and selected from 63 submissions. The papers are arranged by topic: Cryptographic Protocol in Quantum Computer Age; Security Analysis of Hash Algorithm; Security analysis of Symmetric Key Encryption Algorithm; Fault and Side-Channel Attack; Constructions and Designs; Quantum Circuit; Efficient Implementation. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.

Cryptology and Network Security

Cryptology and Network Security
Author :
Publisher : Springer
Total Pages : 518
Release :
ISBN-10 : 9783030004347
ISBN-13 : 3030004341
Rating : 4/5 (47 Downloads)

Synopsis Cryptology and Network Security by : Jan Camenisch

This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

Data Science and Applications

Data Science and Applications
Author :
Publisher : Springer Nature
Total Pages : 596
Release :
ISBN-10 : 9789819978175
ISBN-13 : 9819978173
Rating : 4/5 (75 Downloads)

Synopsis Data Science and Applications by : Satyasai Jagannath Nanda

This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2023), organized by Soft Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 14 to 15 July 2023. The book is divided into four volumes, and it covers theoretical and empirical developments in various areas of big data analytics, big data technologies, decision tree learning, wireless communication, wireless sensor networking, bioinformatics and systems, artificial neural networks, deep learning, genetic algorithms, data mining, fuzzy logic, optimization algorithms, image processing, computational intelligence in civil engineering, and creative computing.

Security of Ubiquitous Computing Systems

Security of Ubiquitous Computing Systems
Author :
Publisher : Springer Nature
Total Pages : 268
Release :
ISBN-10 : 9783030105914
ISBN-13 : 3030105911
Rating : 4/5 (14 Downloads)

Synopsis Security of Ubiquitous Computing Systems by : Gildas Avoine

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Applied Cryptography and Network Security

Applied Cryptography and Network Security
Author :
Publisher : Springer Nature
Total Pages : 476
Release :
ISBN-10 : 9783031547768
ISBN-13 : 3031547764
Rating : 4/5 (68 Downloads)

Synopsis Applied Cryptography and Network Security by : Christina Pöpper