03814nam 22007335 450 99641821890331620200701151157.03-030-42921-010.1007/978-3-030-42921-8(CKB)4100000011223227(MiAaPQ)EBC6157921(DE-He213)978-3-030-42921-8(PPN)243760841(EXLCZ)99410000001122322720200403d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInformation Security and Cryptology[electronic resource] 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers /edited by Zhe Liu, Moti Yung1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (560 pages)Security and Cryptology ;120203-030-42920-2 Includes bibliographical references and index.Invited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel Attacks -- Identity-Based Cryptography -- Signatures -- Cryptanalysis -- Authentication -- Mathematical Foundations.This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.Security and Cryptology ;12020Computer securityData encryption (Computer science)Application softwareComputer communication systemsComputer networksSecurity measuresArchitecture, ComputerSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Computer System Implementationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13057Computer security.Data encryption (Computer science).Application software.Computer communication systems.Computer networksSecurity measures.Architecture, Computer.Systems and Data Security.Cryptology.Information Systems Applications (incl. Internet).Computer Communication Networks.Mobile and Network Security.Computer System Implementation.005.8Liu Zheedthttp://id.loc.gov/vocabulary/relators/edtYung Motiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418218903316Information Security and Cryptology772230UNISA