Information Security and Cryptology - ICISC 2018 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers / [electronic resource] :
edited by Kwangsu Lee.
- 1st ed. 2019.
- XV, 371 p. 342 illus., 25 illus. in color. online resource.
- Security and Cryptology, 11396 2946-1863 ; .
- Security and Cryptology, 11396 .
Invited Talk -- Public-Key Encryption and Implementation -- Homomorphic Encryption -- Secure Multiparty Computation -- Post-Quantum Cryptography -- Secret Sharing and Searchable Encryption -- Storage Security and Information Retrieval -- Attacks and Software Security.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.
9783030121464
10.1007/978-3-030-12146-4 doi
Data protection.
Computers and civilization.
Coding theory.
Information theory.
Data mining.
Artificial intelligence.
Data and Information Security.
Computers and Society.
Coding and Information Theory.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
QA76.9.A25
005.8
Invited Talk -- Public-Key Encryption and Implementation -- Homomorphic Encryption -- Secure Multiparty Computation -- Post-Quantum Cryptography -- Secret Sharing and Searchable Encryption -- Storage Security and Information Retrieval -- Attacks and Software Security.
This book constitutes revised selected papers from the 21st International Conference on Information Security and Cryptology, ICISC 2018, held in Seoul, South Korea, in November 2018. The total of 21 papers presented in this volume were carefully reviewed and selected from 49 submissions. The papers were organized in topical sections named: public-key encryption and implementation; homomorphic encryption; secure multiparty computation; post-quantum cryptography; secret sharing and searchable encryption; storage security and information retrieval; and attacks and software security.
9783030121464
10.1007/978-3-030-12146-4 doi
Data protection.
Computers and civilization.
Coding theory.
Information theory.
Data mining.
Artificial intelligence.
Data and Information Security.
Computers and Society.
Coding and Information Theory.
Data Mining and Knowledge Discovery.
Artificial Intelligence.
QA76.9.A25
005.8