|
Showing 1 - 3 of
3 matches in All Departments
This book consists of refereed selected papers from the
International Conference on Security & Privacy - ICSP 2020. The
book is focused on the state-of-the-art developments of network
security, secure cryptographic protocols, post-quantum
cryptography, quantum cryptography, block-chain and cryptocurrency,
IoT security and privacy, cloud security, machine learning in
cybersecurity, and other disciplines related to security and
privacy. In this book, a wide variety of basic security primitives
are discussed along with recent developments in some advanced
topics like functional encryption, two-party/multi-party
computation, bitcoin, cryptocurrency, and post-quantum security.
This book consists of refereed selected papers from the
International Conference on Security & Privacy - ICSP 2020. The
book is focused on the state-of-the-art developments of network
security, secure cryptographic protocols, post-quantum
cryptography, quantum cryptography, block-chain and cryptocurrency,
IoT security and privacy, cloud security, machine learning in
cybersecurity, and other disciplines related to security and
privacy. In this book, a wide variety of basic security primitives
are discussed along with recent developments in some advanced
topics like functional encryption, two-party/multi-party
computation, bitcoin, cryptocurrency, and post-quantum security.
|
Security and Privacy - Second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings (Paperback, 1st ed. 2021)
Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath
|
R1,879
Discovery Miles 18 790
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Conference, ICSP 2021, held in Jamshedpur, India, in
November 2021. The 10 full papers were carefully reviewed and
selected from 44 submissions. The contributions are organized in
the following blocks: Cryptanalysis and other attacks; Symmetric
cryptography and hash functions; Mathematical foundations of
cryptography; Embedded systems security; Security in hardware;
Authentication, Key management, Public key (asymmetric) techniques,
and Information-theoretic techniques.
|
|