LEADER 04569nam 22007095 450 001 9910410057003321 005 20200701035939.0 010 $a3-030-41702-6 024 7 $a10.1007/978-3-030-41702-4 035 $a(CKB)5300000000003488 035 $a(DE-He213)978-3-030-41702-4 035 $a(MiAaPQ)EBC6125972 035 $a(Au-PeEL)EBL6125972 035 $a(OCoLC)1143624305 035 $a(PPN)243222726 035 $a(EXLCZ)995300000000003488 100 $a20200222d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11?12, 2019, Proceedings /$fedited by Maryline Laurent, Thanassis Giannetsos 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 253 p. 91 illus., 29 illus. in color.) 225 1 $aSecurity and Cryptology ;$v12024 311 $a3-030-41701-8 327 $aInvited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations ? With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper). 330 $aThis volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things. 410 0$aSecurity and Cryptology ;$v12024 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer communication systems 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 0$aComputer communication systems. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 676 $a005.8 702 $aLaurent$b Maryline$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGiannetsos$b Thanassis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910410057003321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA