LEADER 03762nam 22007335 450 001 9910380758803321 005 20200701030335.0 010 $a3-030-40921-X 024 7 $a10.1007/978-3-030-40921-0 035 $a(CKB)4100000010480266 035 $a(DE-He213)978-3-030-40921-0 035 $a(MiAaPQ)EBC6111988 035 $a(PPN)242979181 035 $a(EXLCZ)994100000010480266 100 $a20200213d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Cryptology ? ICISC 2019 $e22nd International Conference, Seoul, South Korea, December 4?6, 2019, Revised Selected Papers /$fedited by Jae Hong Seo 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 317 p. 96 illus., 33 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11975 311 $a3-030-40920-1 320 $aIncludes bibliographical references and index. 327 $aPublic-key encryption. - Implementation -- Homomorphic encryption -- Secure multiparty computation -- Post-quantum cryptography -- Secret sharing -- Searchable encryption -- Storage security -- Information retrieval -- Attacks -- Software security. 330 $aThis book constitutes revised selected papers from the 22nd International Conference on Information Security and Cryptology, ICISC 2019, held in Seoul, South Korea, in December 2019. The total of 18 papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security. 410 0$aSecurity and Cryptology ;$v11975 606 $aComputer security 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer networks$xSecurity measures 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer networks$xSecurity measures. 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aInformation Systems and Communication Service. 676 $a005.8 676 $a005.8 702 $aSeo$b Jae Hong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910380758803321 996 $aInformation Security and Cryptology ? ICISC 2019$92227378 997 $aUNINA