Information Security and Cryptology -- ICISC 2012

Information Security and Cryptology -- ICISC 2012 PDF Author: Taekyoung Kwon
Publisher: Springer
ISBN: 3642376827
Category : Computers
Languages : en
Pages : 525

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

Information Security and Cryptology – ICISC 2017

Information Security and Cryptology – ICISC 2017 PDF Author: Howon Kim
Publisher: Springer
ISBN: 3319785567
Category : Computers
Languages : en
Pages : 372

Get Book Here

Book Description
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Information Security and Cryptology - ICISC 2015

Information Security and Cryptology - ICISC 2015 PDF Author: Soonhak Kwon
Publisher: Springer
ISBN: 3319308408
Category : Computers
Languages : en
Pages : 375

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015. The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.

Information Security and Cryptology -- ICISC 2013

Information Security and Cryptology -- ICISC 2013 PDF Author: Hyang-Sook Lee
Publisher: Springer
ISBN: 331912160X
Category : Computers
Languages : en
Pages : 536

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Information Security and Cryptology – ICISC 2018

Information Security and Cryptology – ICISC 2018 PDF Author: Kwangsu Lee
Publisher: Springer
ISBN: 3030121461
Category : Computers
Languages : en
Pages : 375

Get Book Here

Book Description
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.

Information Security and Cryptology

Information Security and Cryptology PDF Author: Dongdai Lin
Publisher: Springer
ISBN: 3319167456
Category : Computers
Languages : en
Pages : 549

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Information Security and Cryptology – ICISC 2023

Information Security and Cryptology – ICISC 2023 PDF Author: Hwajeong Seo
Publisher: Springer Nature
ISBN: 9819712386
Category :
Languages : en
Pages : 317

Get Book Here

Book Description


Codes, Cryptology and Information Security

Codes, Cryptology and Information Security PDF Author: Said El Hajji
Publisher: Springer
ISBN: 3319555898
Category : Computers
Languages : en
Pages : 395

Get Book Here

Book Description
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

ICIDSSD 2020

ICIDSSD 2020 PDF Author: M. Afshar Alam
Publisher: European Alliance for Innovation
ISBN: 163190292X
Category : Social Science
Languages : en
Pages : 606

Get Book Here

Book Description
The International Conference on ICT for Digital, Smart, and Sustainable Development (ICIDSSD’20) aims to provide an annual platform for the researchers, academicians, and professionals from across the world. ICIDSSD’20, held at Jamia Hamdard, New Delhi, India, is the second international conference of this series of conferences to be held annually. The conference majorly focuses on the recent developments in the areas relating to Information and Communication Technologies and contributing to Sustainable Development. ICIDSSD’20 has attracted research papers pertaining to an array of exciting research areas. The selected papers cover a wide range of topics including but not limited to Sustainable Development, Green Computing, Smart City, Artificial Intelligence, Big Data, Machine Learning, Cloud Computing, IoT, ANN, Cyber Security, and Data Science. Papers have primarily been judged on originality, presentation, relevance, and quality of work. Papers that clearly demonstrate results have been preferred. We thank our esteemed authors for having shown confidence in us and entrusting us with the publication of their research papers. The success of the conference would not have been possible without the submission of their quality research works. We thank the members of the International Scientific Advisory Committee, Technical Program Committee and members of all the other committees for their advice, guidance, and efforts. Also, we are grateful to our technical partners and sponsors, viz. HNF, EAI, ISTE, AICTE, IIC, CSI, IETE, Department of Higher Education, MHRD and DST for sponsorship and assistance.

Intelligent Security Management and Control in the IoT

Intelligent Security Management and Control in the IoT PDF Author: Mohamed-Aymen Chalouf
Publisher: John Wiley & Sons
ISBN: 1789450535
Category : Computers
Languages : en
Pages : 322

Get Book Here

Book Description
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications and network access, the management of service quality and energy consumption, and the implementation of security mechanisms dedicated to the IoT. In response to these issues, this book presents new solutions for the management and control of performance and security in the IoT. The originality of these proposals lies mainly in the use of intelligent techniques. This notion of intelligence allows, among other things, the support of object heterogeneity and limited capacities as well as the vast dynamics characterizing the IoT.