03765nam 22007215 450 99641820910331620200701030335.03-030-40921-X10.1007/978-3-030-40921-0(CKB)4100000010480266(DE-He213)978-3-030-40921-0(MiAaPQ)EBC6111988(PPN)242979181(EXLCZ)99410000001048026620200213d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security and Cryptology – ICISC 2019[electronic resource] 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers /edited by Jae Hong Seo1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (X, 317 p. 96 illus., 33 illus. in color.) Security and Cryptology ;119753-030-40920-1 Includes bibliographical references and index.Public-key encryption. - Implementation -- Homomorphic encryption -- Secure multiparty computation -- Post-quantum cryptography -- Secret sharing -- Searchable encryption -- Storage security -- Information retrieval -- Attacks -- Software security.This book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019. The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.Security and Cryptology ;11975Computer securityData encryption (Computer science)Coding theoryInformation theoryComputer networksSecurity measuresComputersSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Security Serviceshttps://scigraph.springernature.com/ontologies/product-market-codes/I28030Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Computer security.Data encryption (Computer science).Coding theory.Information theory.Computer networksSecurity measures.Computers.Systems and Data Security.Cryptology.Coding and Information Theory.Security Services.Mobile and Network Security.Information Systems and Communication Service.005.8Seo Jae Hongedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418209103316Information Security and Cryptology – ICISC 20192227378UNISA