My Account Log in

1 option

Security and Privacy : Select Proceedings of ICSP 2020 / edited by Pantelimon Stănică, Sugata Gangopadhyay, Sumit Kumar Debnath.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Stănică, Pantelimon, Editor.
Gangopadhyay, Sugata., Editor.
Debnath, Sumit Kumar., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Lecture notes in electrical engineering 1876-1119 ; 744
Lecture Notes in Electrical Engineering, 1876-1119 ; 744
Language:
English
Subjects (All):
Computer networks-Security measures.
Data protection.
Database management.
Artificial intelligence.
Cryptography.
Data encryption (Computer science).
Mobile and Network Security.
Data and Information Security.
Database Management System.
Artificial Intelligence.
Cryptology.
Local Subjects:
Mobile and Network Security.
Data and Information Security.
Database Management System.
Artificial Intelligence.
Cryptology.
Physical Description:
1 online resource (XIV, 176 pages) : 41 illustrations, 24 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This book consists of refereed selected papers from the International Conference on Security and Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
Contents:
A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates
Combining Human Ear and Profile Face Biometrics for Identity Recognition
Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA
Efficient Random Grid Visual Cryptographic Schemes having Essential Members
Further results on bent-negabent Boolean functions
Generalization of Lattice Based Cryptography on Hypercomplex Algebras
Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model
Image Security using Hyperchaos and Multidimensional Playfair Cipher
Iris recognition using improved Xor-Sum Code
Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$
Low c-differential uniformity for the Gold function modified on a subfield
Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography
Provably insecure group authentication Not all security proofs are what they claim to be
Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.
Other Format:
Printed edition:
ISBN:
978-981-33-6781-4
9789813367814
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account