Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Security and Privacy -

Security and Privacy (eBook)

Select Proceedings of ICSP 2020
eBook Download: PDF
2021 | 1st ed. 2021
XIV, 176 Seiten
Springer Singapore (Verlag)
978-981-336-781-4 (ISBN)
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

 This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.



Pantelimon Stanica is currently working as a Professor in the Department of Applied Mathematics, Graduate School of Engineering & Applied Sciences (GSEAS) at Naval Postgraduate School, Monterey, USA. He is also associated with the Institute of Mathematics of Romanian Academy as a researcher. He received his doctoral degree in mathematics from the State University of New York at Buffalo in 1998. He also received a doctorate in algebra from the Institute of Mathematics of the Romanian Academy in 1998. He has published over 150 research articles in internationally reputed journals and conferences and has co-authored a book on Cryptographic Boolean Functions (now in the second edition) and co-edited two conference proceedings. His research interests include number theory, cryptography, coding theory, combinatorics, finite fields, Boolean functions, valuation theory, class field theory, and theoretical computer science.

Sugata Gangopadhyay is currently working as a Professor in the Department of Computer Science, Indian Institute of Technology Roorkee, India. He received his doctoral degree in mathematics from the Indian Institute of Technology Kharagpur, India, in 1998. He received an Outstanding Teacher Award in 2016 from IIT Roorkee and ONR-Global VSP award to visit Naval Postgraduate School, Monterey, California USA. He served in the program committee of NSUCRYPTO the International Students' Olympiad in Cryptography organized by Novosibirsk State University, Russia. He has published several research articles in internationally reputed journals and conferences. His research interests include cryptology, cryptographic Boolean functions, and stream cipher cryptanalysis.

 Sumit Kumar Debnath is an Assistant Professor in the Department of Mathematics, National Institute of Technology Jamshedpur, India. He received his doctoral degree in cryptology & network security from the Indian Institute of Technology Kharagpur, India, in 2017. He has published several research articles in internationally reputed journals and conferences. He is a life member of the Cryptology Research Society of India (CRSI). His research interests include multivariate cryptography, lattice-based cryptography, isogeny-based cryptography, quantum cryptography, secure two-party/multi-party computation, secure set intersection, electronic voting, functional encryption, identity-based cryptography, and oblivious transfer.


 This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
Erscheint lt. Verlag 2.4.2021
Reihe/Serie Lecture Notes in Electrical Engineering
Lecture Notes in Electrical Engineering
Zusatzinfo XIV, 176 p. 41 illus., 24 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Mathematik / Informatik Informatik Web / Internet
Naturwissenschaften
Schlagworte Access Control • authentication and authorization • biometric security • blockchain and cryptocurrency • Cloud and Edge computing Security • Cloud Security • cyber-physical security • Database Security • embedded systems security • IoT security and privacy • Leakage-resilient cryptography • Lightweight Security • Network Security • post-quantum cryptography • Privacy-preserving Technologies • Quantum Cryptography • Secure Cryptographic Protocols • Security and Privacy of Big Data • Social Networks Security, Privacy and Trust • steganography and steganalysis
ISBN-10 981-336-781-4 / 9813367814
ISBN-13 978-981-336-781-4 / 9789813367814
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95