LEADER 03789nam 22007335 450 001 9910409674403321 005 20200701151157.0 010 $a3-030-42921-0 024 7 $a10.1007/978-3-030-42921-8 035 $a(CKB)4100000011223227 035 $a(MiAaPQ)EBC6157921 035 $a(DE-He213)978-3-030-42921-8 035 $a(PPN)243760841 035 $a(EXLCZ)994100000011223227 100 $a20200403d2020 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Cryptology $e15th International Conference, Inscrypt 2019, Nanjing, China, December 6?8, 2019, Revised Selected Papers /$fedited by Zhe Liu, Moti Yung 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (560 pages) 225 1 $aSecurity and Cryptology ;$v12020 311 $a3-030-42920-2 320 $aIncludes bibliographical references and index. 327 $aInvited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel Attacks -- Identity-Based Cryptography -- Signatures -- Cryptanalysis -- Authentication -- Mathematical Foundations. 330 $aThis book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations. 410 0$aSecurity and Cryptology ;$v12020 606 $aComputer security 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputer communication systems 606 $aComputer networks$xSecurity measures 606 $aArchitecture, Computer 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aComputer networks$xSecurity measures. 615 0$aArchitecture, Computer. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aComputer System Implementation. 676 $a005.8 702 $aLiu$b Zhe$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910409674403321 996 $aInformation Security and Cryptology$9772230 997 $aUNINA