Amazon cover image
Image from Amazon.com

Security and Privacy [electronic resource] : Select Proceedings of ICSP 2020 /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Electrical Engineering ; 744Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2021Edition: 1st ed. 2021Description: XIV, 176 p. 41 illus., 24 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789813367814
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59
Online resources:
Contents:
A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates -- Combining Human Ear and Profile Face Biometrics for Identity Recognition -- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model -- Image Security using Hyperchaos and Multidimensional Playfair Cipher -- Iris recognition using improved Xor-Sum Code -- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$ -- Low c-differential uniformity for the Gold function modified on a subfield -- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography -- Provably insecure group authentication Not all security proofs arewhat they claim to be -- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.
In: Springer Nature eBookSummary: This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates -- Combining Human Ear and Profile Face Biometrics for Identity Recognition -- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model -- Image Security using Hyperchaos and Multidimensional Playfair Cipher -- Iris recognition using improved Xor-Sum Code -- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$ -- Low c-differential uniformity for the Gold function modified on a subfield -- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography -- Provably insecure group authentication Not all security proofs arewhat they claim to be -- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in