Information Security and Cryptology – ICISC 2019 [[electronic resource] ] : 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers / / edited by Jae Hong Seo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 317 p. 96 illus., 33 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Computer networks - Security measures Computers Systems and Data Security Cryptology Coding and Information Theory Security Services Mobile and Network Security Information Systems and Communication Service |
ISBN | 3-030-40921-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public-key encryption. - Implementation -- Homomorphic encryption -- Secure multiparty computation -- Post-quantum cryptography -- Secret sharing -- Searchable encryption -- Storage security -- Information retrieval -- Attacks -- Software security. |
Record Nr. | UNISA-996418209103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Cryptology – ICISC 2019 : 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers / / edited by Jae Hong Seo |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (X, 317 p. 96 illus., 33 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Computer networks - Security measures Computers Systems and Data Security Cryptology Coding and Information Theory Security Services Mobile and Network Security Information Systems and Communication Service |
ISBN | 3-030-40921-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public-key encryption. - Implementation -- Homomorphic encryption -- Secure multiparty computation -- Post-quantum cryptography -- Secret sharing -- Searchable encryption -- Storage security -- Information retrieval -- Attacks -- Software security. |
Record Nr. | UNINA-9910380758803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop / / Keita Emura, Jae Hong Seo, Yohei Watanabe |
Autore | Emura Keita |
Pubbl/distr/stampa | New York, NY : , : ACM, , 2018 |
Descrizione fisica | 1 online resource (66 pages) |
Disciplina | 005.8 |
Soggetto topico |
Data protection
Computer security |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910376155103321 |
Emura Keita | ||
New York, NY : , : ACM, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|