000 04192nam a22006255i 4500
001 978-981-33-6781-4
003 DE-He213
005 20240423130132.0
007 cr nn 008mamaa
008 210402s2021 si | s |||| 0|eng d
020 _a9789813367814
_9978-981-33-6781-4
024 7 _a10.1007/978-981-33-6781-4
_2doi
050 4 _aTK5105.59
072 7 _aUTN
_2bicssc
072 7 _aCOM043050
_2bisacsh
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity and Privacy
_h[electronic resource] :
_bSelect Proceedings of ICSP 2020 /
_cedited by Pantelimon Stănică, Sugata Gangopadhyay, Sumit Kumar Debnath.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXIV, 176 p. 41 illus., 24 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v744
505 0 _aA Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates -- Combining Human Ear and Profile Face Biometrics for Identity Recognition -- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA -- Efficient Random Grid Visual Cryptographic Schemes having Essential Members -- Further results on bent-negabent Boolean functions -- Generalization of Lattice Based Cryptography on Hypercomplex Algebras -- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model -- Image Security using Hyperchaos and Multidimensional Playfair Cipher -- Iris recognition using improved Xor-Sum Code -- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$ -- Low c-differential uniformity for the Gold function modified on a subfield -- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography -- Provably insecure group authentication Not all security proofs arewhat they claim to be -- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.
520 _a This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData protection.
650 0 _aDatabase management.
650 0 _aArtificial intelligence.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 1 4 _aMobile and Network Security.
650 2 4 _aData and Information Security.
650 2 4 _aDatabase Management System.
650 2 4 _aArtificial Intelligence.
650 2 4 _aCryptology.
700 1 _aStănică, Pantelimon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aGangopadhyay, Sugata.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDebnath, Sumit Kumar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789813367807
776 0 8 _iPrinted edition:
_z9789813367821
776 0 8 _iPrinted edition:
_z9789813367838
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v744
856 4 0 _uhttps://doi.org/10.1007/978-981-33-6781-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c185429
_d185429