Security and Privacy [electronic resource] : Select Proceedings of ICSP 2020 /
Material type: TextSeries: Lecture Notes in Electrical Engineering ; 744Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2021Edition: 1st ed. 2021Description: XIV, 176 p. 41 illus., 24 illus. in color. online resourceContent type:- text
- computer
- online resource
- 9789813367814
- 005.8 23
- TK5105.59
A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates -- Combining Human Ear and Profile Face Biometrics for Identity Recognition -- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model -- Image Security using Hyperchaos and Multidimensional Playfair Cipher -- Iris recognition using improved Xor-Sum Code -- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$ -- Low c-differential uniformity for the Gold function modified on a subfield -- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography -- Provably insecure group authentication Not all security proofs arewhat they claim to be -- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.
This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
There are no comments on this title.