03713nam 22007215 450 991099393110332120250410135724.03-031-87541-910.1007/978-3-031-87541-0(CKB)38337798100041(DE-He213)978-3-031-87541-0(MiAaPQ)EBC32005817(Au-PeEL)EBL32005817(EXLCZ)993833779810004120250410d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierSecurity Standardisation Research 9th International Conference, SSR 2024, Kunming, China, December 16, 2024, Proceedings /edited by Xianhui Lu, Chris J. Mitchell1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XI, 187 p. 37 illus., 16 illus. in color.) Lecture Notes in Computer Science,1611-3349 ;155593-031-87540-0 -- Invited keynote talks. -- Standardisation of and Migration to Post-Quantum Cryptography. -- Contributed papers. -- The Vision of Multi-Party Computation Technical Standards. -- Vision Paper: Do we need Standardization of Blockchain Consensus?. .-Security and Privacy Evaluation of IP Cameras on Shodan. .-Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol. .-SoK: Post-Quantum Key Encapsulation Mechanisms - Security Definitions, Constructions and Applications. .-Scloud+: An Efficient LWE-based KEM Without Ring/Module Structure. .-Transitioning to Quantum Secure Encryption Schemes.This book constitutes the refereed proceedings of the 9th International Conference on Security Standardisation Research, SSR 2024, held in Kunming, China, during December 16, 2024. The 7 full papers included in this book were carefully reviewed and selected from 19 submissions. These papers focus on a wide range of topics within the field of Security standardization research. This book also includes the full paper from the invited keynote talk titled "Standardisation of and Migration to Post-Quantum Cryptography", given by Liqun Chen. .Lecture Notes in Computer Science,1611-3349 ;15559Data protectionCryptographyData encryption (Computer science)Computer networksSecurity measuresComputer networksApplication softwareData and Information SecurityCryptologyMobile and Network SecuritySecurity ServicesComputer Communication NetworksComputer and Information Systems ApplicationsData protection.Cryptography.Data encryption (Computer science)Computer networksSecurity measures.Computer networks.Application software.Data and Information Security.Cryptology.Mobile and Network Security.Security Services.Computer Communication Networks.Computer and Information Systems Applications.005.8Lu Xianhuiedthttp://id.loc.gov/vocabulary/relators/edtMitchell Chris Jedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910993931103321Security standardisation research2065770UNINA