Security and Privacy Select Proceedings of ICSP 2020 /

Security and Privacy Select Proceedings of ICSP 2020 / [electronic resource] : edited by Pantelimon Stănică, Sugata Gangopadhyay, Sumit Kumar Debnath. - 1st ed. 2021. - XIV, 176 p. 41 illus., 24 illus. in color. online resource. - Lecture Notes in Electrical Engineering, 744 1876-1119 ; . - Lecture Notes in Electrical Engineering, 744 .

A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates -- Combining Human Ear and Profile Face Biometrics for Identity Recognition -- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model -- Image Security using Hyperchaos and Multidimensional Playfair Cipher -- Iris recognition using improved Xor-Sum Code -- Linear Complementary Dual Codes over $mathbb_2mathbb_4$ -- Low c-differential uniformity for the Gold function modified on a subfield -- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography -- Provably insecure group authentication Not all security proofs arewhat they claim to be -- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

9789813367814

10.1007/978-981-33-6781-4 doi


Computer networks--Security measures.
Data protection.
Database management.
Artificial intelligence.
Cryptography.
Data encryption (Computer science).
Mobile and Network Security.
Data and Information Security.
Database Management System.
Artificial Intelligence.
Cryptology.

TK5105.59

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in