Security and Privacy

Security and Privacy

Select Proceedings of ICSP 2020

Gangopadhyay, Sugata; Stanica, Pantelimon; Debnath, Sumit Kumar

Springer Verlag, Singapore

04/2022

176

Mole

Inglês

9789813367838

15 a 20 dias

302

Descrição não disponível.
A Score Level Fusion Method for Protecting Fingerprint and Palmprint Templates.- Combining Human Ear and Profile Face Biometrics for Identity Recognition.- Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA.- Efficient Random Grid Visual Cryptographic Schemes having Essential Members.- Further results on bent-negabent Boolean functions.- Generalization of Lattice Based Cryptography on Hypercomplex Algebras.- Health Monitoring of Hydraulic System Using Feature based Multivariate Time-series Classification Model.- Image Security using Hyperchaos and Multidimensional Playfair Cipher.- Iris recognition using improved Xor-Sum Code.- Linear Complementary Dual Codes over $mathbb{Z}_2mathbb{Z}_4$.- Low c-differential uniformity for the Gold function modified on a subfield.- Post-Quantum Secure Identity Based Encryption from Multivariate Public Key Cryptography.- Provably insecure group authentication Not all security proofs arewhat they claim to be.- Terahertz Communication Merit Demerit and Future challenges regarding 6G Wireless Networks.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Network Security;Secure Cryptographic Protocols;Post-quantum Cryptography;Quantum Cryptography;Blockchain and Cryptocurrency;IoT Security and Privacy;Cloud Security;Privacy-preserving Technologies;Biometric Security;Security and Privacy of Big Data;Cloud and Edge computing Security;Access control;Steganography and Steganalysis;Leakage-resilient Cryptography;Cyber-physical Security;Database Security;Embedded Systems Security;Lightweight Security;Authentication and Authorization;Social Networks Security, Privacy and Trust