Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings

Author:   Maryline Laurent ,  Thanassis Giannetsos
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12024
ISBN:  

9783030417017


Pages:   253
Publication Date:   23 February 2020
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings


Add your own review!

Overview

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.

Full Product Details

Author:   Maryline Laurent ,  Thanassis Giannetsos
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12024
Weight:   0.454kg
ISBN:  

9783030417017


ISBN 10:   3030417018
Pages:   253
Publication Date:   23 February 2020
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Invited Paper.- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk).- Authentication.- A Lattice-based Enhanced Privacy ID.- A Generic View on the Unified Zero-Knowledge Protocol and its Applications.- Cryptography.- Verifiable and Private Oblivious Polynomial Evaluation.- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations – With an Illustration on AES.- Strong Designated Verifier Signature Based on the Rank Metric.- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things.- Threats.- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture.- Threat Analysis of Poisoning Attack against Ethereum Blockchain.- A Template-based Method for the Generation of Attack Trees (short paper).- Cybersecurity.- Analysis of QUIC Session Establishment and its Implementations.- CompactFlow: A Hybrid Binary Format for Network Flow Data.- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities.- Internet of Things.- Automated Security Analysis of IoT Software Updates.- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List