Advertisement

© 2020

Information Security and Cryptology

15th International Conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019, Revised Selected Papers

  • Zhe Liu
  • Moti Yung
Conference proceedings Inscrypt 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 12020)

Also part of the Security and Cryptology book sub series (LNSC, volume 12020)

Table of contents

  1. Front Matter
    Pages i-xiv
  2. Invited Paper

    1. Front Matter
      Pages 1-1
    2. Xinyu Zhang, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu
      Pages 3-27
  3. Post-Quantum Cryptography

    1. Front Matter
      Pages 29-29
    2. Yingshan Yang, Xiaozhuo Gu, Bin Wang, Taizhong Xu
      Pages 31-49
    3. Dung Hoang Duong, Willy Susilo, Minh Kim Bui, Thanh Xuan Khuc
      Pages 50-65
    4. Jie Li, Mimi Ma, Jiang Zhang, Shuqin Fan, Shuaigang Li
      Pages 66-85
  4. AI Security

    1. Front Matter
      Pages 99-99
    2. Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen
      Pages 101-117
    3. Weiqing Huang, Xiao Peng, Zhixin Shi
      Pages 118-133
    4. Yuyue Zhao, Yangyang Li, Tengfei Yang, Haiyong Xie
      Pages 134-153
  5. Systems Security

    1. Front Matter
      Pages 155-155
    2. Yueyao Chen, Qianjun Liu, Tianyu Du, Yuan Chen, Shouling Ji
      Pages 157-172
    3. Jinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Changting Lin, Shouling Ji
      Pages 173-198
    4. Hao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo
      Pages 208-224
    5. Huayi Li, Yuanyuan Zhan, Wang Jianqiang, Dawu Gu
      Pages 225-245
    6. Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang
      Pages 246-259
    7. Senshan Pan, Zhuhua Li, Liangmin Wang
      Pages 260-276

About these proceedings

Introduction

This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019.

The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.

Keywords

artificial intelligence authentication computer crime computer hardware computer networks computer security computer systems cryptography data security electronic document identification systems engineering network protocols network security privacy public key cryptography telecommunication networks telecommunication systems

Editors and affiliations

  • Zhe Liu
    • 1
  • Moti Yung
    • 2
  1. 1.College of Computer Science and TechnologyNanjing University of Aeronautics and AstronauticsNanjingChina
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUSA

Bibliographic information

Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Engineering
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace