Security and Privacy [E-Book] : Select Proceedings of ICSP 2020 / edited by Pantelimon Stănică, Sugata Gangopadhyay, Sumit Kumar Debnath.
This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and crypt...
Saved in:
Full text |
|
Personal Name(s): | Debnath, Sumit Kumar, editor |
Gangopadhyay, Sugata, editor / Stănică, Pantelimon, editor | |
Edition: |
1st edition 2021. |
Imprint: |
Singapore :
Springer,
2021
|
Physical Description: |
XIV, 176 pages 41 illustrations, 24 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789813367814 |
DOI: |
10.1007/978-981-33-6781-4 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Electrical Engineering ;
744 |
Subject (LOC): |
- A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates
- Combining Human Ear and Profile Face Biometrics for Identity Recognition
- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA
- Efficient Random Grid Visual Cryptographic Schemes having Essential Members
- Further results on bent-negabent Boolean functions
- Generalization of Lattice Based Cryptography on Hypercomplex Algebras
- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model
- Image Security using Hyperchaos and Multidimensional Playfair Cipher
- Iris recognition using improved Xor-Sum Code
- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$
- Low c-differential uniformity for the Gold function modified on a subfield
- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography
- Provably insecure group authentication Not all security proofs are what they claim to be
- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.