My Account Log in

1 option

Information Security and Cryptology - ICISC 2018 : 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers / edited by Kwangsu Lee.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Lee, Kwangsu, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11396
Security and Cryptology ; 11396
Language:
English
Subjects (All):
Data protection.
Computers and civilization.
Coding theory.
Information theory.
Data mining.
Artificial intelligence.
Data and Information Security.
Computers and Society.
Coding and Information Theory.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
Local Subjects:
Data and Information Security.
Computers and Society.
Coding and Information Theory.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
Physical Description:
1 online resource (XV, 371 pages) : 342 illustrations, 25 illustrations in color.
Edition:
1st ed. 2019.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.
Contents:
Invited Talk
Public-Key Encryption and Implementation
Homomorphic Encryption
Secure Multiparty Computation
Post-Quantum Cryptography
Secret Sharing and Searchable Encryption
Storage Security and Information Retrieval
Attacks and Software Security.
Other Format:
Printed edition:
ISBN:
978-3-030-12146-4
9783030121464
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account