Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12020)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: Inscrypt 2019.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (33 papers)
-
Invited Paper
-
Post-Quantum Cryptography
-
Systems Security
Keywords
- artificial intelligence
- authentication
- computer crime
- computer hardware
- computer networks
- computer security
- computer systems
- cryptography
- data security
- electronic document identification systems
- engineering
- network protocols
- network security
- privacy
- public key cryptography
- telecommunication networks
- telecommunication systems
About this book
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.
The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: 15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers
Editors: Zhe Liu, Moti Yung
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-42921-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2020
Softcover ISBN: 978-3-030-42920-1Published: 04 April 2020
eBook ISBN: 978-3-030-42921-8Published: 03 April 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 562
Number of Illustrations: 193 b/w illustrations, 71 illustrations in colour
Topics: Systems and Data Security, Cryptology, Information Systems Applications (incl. Internet), Computer Communication Networks, Mobile and Network Security, Computer System Implementation