04572nam 22006975 450 99641829700331620200701035939.03-030-41702-610.1007/978-3-030-41702-4(CKB)5300000000003488(DE-He213)978-3-030-41702-4(MiAaPQ)EBC6125972(Au-PeEL)EBL6125972(OCoLC)1143624305(PPN)243222726(EXLCZ)99530000000000348820200222d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Security Theory and Practice[electronic resource] 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings /edited by Maryline Laurent, Thanassis Giannetsos1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (X, 253 p. 91 illus., 29 illus. in color.) Security and Cryptology ;120243-030-41701-8 Invited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations – With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.Security and Cryptology ;12024Computer securityData encryption (Computer science)Computer networksSecurity measuresComputer communication systemsApplication softwareSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computer security.Data encryption (Computer science).Computer networksSecurity measures.Computer communication systems.Application software.Systems and Data Security.Cryptology.Mobile and Network Security.Computer Communication Networks.Information Systems Applications (incl. Internet).005.8Laurent Marylineedthttp://id.loc.gov/vocabulary/relators/edtGiannetsos Thanassisedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996418297003316Information Security Theory and Practice2073240UNISA