Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers /: 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers. (2017)
- Record Type:
- Book
- Title:
- Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers /: 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers. (2017)
- Main Title:
- Information security and cryptology -- ICISC 2016 : 19th International Conference, Seoul, South Korea, November 30-December 2, 2016, Revised selected papers
- Other Titles:
- ICISC 2016
- Further Information:
- Note: Seokhie Hong, Jong Hwan Park (eds.).
- Editors:
- Hong, Seokhie
Park, Jong Hwan - Other Names:
- ICISC (Conference), 19th
- Contents:
- Protocols -- Secure and Private, yet Lightweight, Authentication for the IoT via PUF and CBKA -- Lattice Cryptography -- Practical post-quantum public key cryptosystem based on LWE -- Analysis of Error Terms of Signatures Based on Learning with Errors -- Encryption -- Transforming Hidden Vector Encryption Schemes from Composite-Order Groups into Prime-Order Groups -- Lossy Key Encapsulation Mechanism and Its Applications -- Expanded Framework for Dual System Encryption and its Application -- Adaptively Secure Broadcast Encryption with Dealership -- Implementation and Algorithms -- A new algorithm for residue multiplication modulo $2 {521}-1$ -- Enhancing Data Parallelism of Fully Homomorphic Encryption -- An Improvement of Optimal Ate Pairing on KSS curve with Pseudo 12-sparse Multiplication -- Signatures (and Protocol) -- Revisiting the Cubic UOV Signature Scheme -- Network Coding Signature Schemes against Related-Key Attacks in the Random Oracle Model -- New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness -- Analysis -- Improved Results on Cryptanalysis of Prime Power RSA -- On Computing the Immunity of Boolean Power Functions against Fast Algebraic Attacks -- Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round -- On the Effectiveness of Code-reuse based Android Application Obfuscation.
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xvi, 351 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Computer Science
Systems and Data Security
Security
Data Encryption
Management of Computing and Information Systems
Computers -- Security -- General
Business & Economics -- Information Management
Computer security
Coding theory & cryptology
Information architecture
Computer security
Data protection
Data encryption (Computer science)
Information Systems
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319531779
3319531778 - Related ISBNs:
- 9783319531762
331953176X - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed February 16, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.364694
- Ingest File:
- 01_338.xml