LEADER 04242nam 22007335 450 001 9910410057003321 005 20251225182022.0 010 $a3-030-41702-6 024 7 $a10.1007/978-3-030-41702-4 035 $a(CKB)5300000000003488 035 $a(DE-He213)978-3-030-41702-4 035 $a(MiAaPQ)EBC6125972 035 $a(Au-PeEL)EBL6125972 035 $a(OCoLC)1143624305 035 $a(PPN)243222726 035 $a(EXLCZ)995300000000003488 100 $a20200222d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security Theory and Practice $e13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11?12, 2019, Proceedings /$fedited by Maryline Laurent, Thanassis Giannetsos 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (X, 253 p. 91 illus., 29 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v12024 311 08$a3-030-41701-8 327 $aInvited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations ? With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper). 330 $aThis volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v12024 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aApplication software 606 $aData and Information Security 606 $aCryptology 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 676 $a005.8 676 $a005.8 702 $aLaurent$b Maryline$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGiannetsos$b Thanassis$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910410057003321 996 $aInformation Security Theory and Practice$92073240 997 $aUNINA