My Account Log in

1 option

Information Security Theory and Practice : 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings / edited by Maryline Laurent, Thanassis Giannetsos.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Laurent-Maknavicius, Maryline, Editor.
Giannetsos, Thanassis, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 12024
Security and Cryptology ; 12024
Language:
English
Subjects (All):
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks-Security measures.
Computer networks.
Application software.
Data and Information Security.
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Computer and Information Systems Applications.
Local Subjects:
Data and Information Security.
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Computer and Information Systems Applications.
Physical Description:
1 online resource (X, 253 pages) : 91 illustrations, 29 illustrations in color.
Edition:
1st ed. 2020.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2020.
System Details:
text file PDF
Summary:
This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.
Contents:
Invited Paper
How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk)
Authentication
A Lattice-based Enhanced Privacy ID
A Generic View on the Unified Zero-Knowledge Protocol and its Applications
Cryptography
Verifiable and Private Oblivious Polynomial Evaluation
Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations - With an Illustration on AES
Strong Designated Verifier Signature Based on the Rank Metric
A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
Threats
Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture
Threat Analysis of Poisoning Attack against Ethereum Blockchain
A Template-based Method for the Generation of Attack Trees (short paper)
Cybersecurity
Analysis of QUIC Session Establishment and its Implementations
CompactFlow: A Hybrid Binary Format for Network Flow Data
SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
Internet of Things
Automated Security Analysis of IoT Software Updates
Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).
Other Format:
Printed edition:
ISBN:
978-3-030-41702-4
9783030417024
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account