- Table View
- List View
Advances in Conceptual Modeling: ER 2020 Workshops CMAI, CMLS, CMOMM4FAIR, CoMoNoS, EmpER, Vienna, Austria, November 3–6, 2020, Proceedings (Lecture Notes in Computer Science #12584)
by Georg Grossmann Sudha RamThis book constitutes the refereed proceedings of five workshops symposia, held at the 39th International Conference on Conceptual Modeling, ER 2020, which were supposed to be held in Vienna, Austria, in November 2020, but were held virtually due to the COVID-19 pandemic instead.The 20 papers promote and disseminate research on theories of concepts underlying conceptual modeling, methods and tools for developing and communicating conceptual models, techniques for transforming conceptual models into effective implementations, and the impact of conceptual modeling techniques on databases, business strategies and information systems. The following workshops are included in this volume: First Workshop on Conceptual Modeling Meets Artificial Intelligence and Data-Driven Decision Making (CMAI); First International Workshop on Conceptual Modeling for Life Sciences (CMLS); Second Workshop on Conceptual Modeling, Ontologies and (Meta)data Management for Findable, Accessible, Interoperable and Reusable (FAIR) Data (CMOMM4FAIR); First Workshop on Conceptual Modeling for NoSQL Data Stores (CoMoNoS); and Third International Workshop on Empirical Methods in Conceptual Modeling (EmpER).
Advances in Conceptual Modeling: ER 2021 Workshops CoMoNoS, EmpER, CMLS St. John's, NL, Canada, October 18–21, 2021, Proceedings (Lecture Notes in Computer Science #13012)
by Shazia Sadiq Iris Reinhartz-BergerThis book constitutes the refereed proceedings of three workshops symposia, held at the 40th International Conference on Conceptual Modeling, ER 2021, which were held virtually and in St. John’s, NL, Canada, in October 2021.The 11 papers promote and disseminate research on theories of concepts underlying conceptual modeling, methods and tools for developing and communicating conceptual models, techniques for transforming conceptual models into effective implementations, and the impact of conceptual modeling techniques on databases, business strategies and information systems. The following workshops are included in this volume: Second Workshop on Conceptual Modeling for NoSQL Data Stores (CoMoNoS); 4th International Workshop on Empirical Methods in Conceptual Modeling (EmpER); and Second International Workshop on Conceptual Modeling for Life Sciences (CMLS).
Advances in Conceptual Modeling: ER 2022 Workshops, CMLS, EmpER, and JUSMOD, Hyderabad, India, October 17–20, 2022, Proceedings (Lecture Notes in Computer Science #13650)
by Renata Guizzardi Bernd NeumayrThis book constitutes the refereed proceedings of three workshops symposia, held at the 41st International Conference on Conceptual Modeling, ER 2022, as a virtual event, in October 2022. The 11 papers deal with topics such as foundations; business information systems; advanced and cross-disciplinary applications, conceptual modeling, information systems and knowledge graphs; data/object management; engineering; and experience. The following workshops are included in this volume: Third International Workshop on Conceptual Modeling for Life Sciences (CMLS), 5th International Workshop on Empirical Methods in Conceptual Modeling (EmpER); and First International Workshop on Digital Justice, Digital Law and Conceptual Modeling (JUSMOD).
Advances in Conceptual Modeling: ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings (Lecture Notes in Computer Science #14319)
by João Araújo Giancarlo Guizzardi José Borbinha Tiago Prince SalesThis book constitutes the refereed proceedings of 7 workshops, held at the 42nd International Conference on Conceptual Modeling, ER 2023, held in Lisbon, Portugal, during November 6-9, 2023. The 28 full and 2 short papers were carefully reviewed and selected out of 53 submissions. Topics of interest span the entire spectrum of conceptual modeling, including research and practice in areas such as theories of concepts and ontologies, techniques for transforming conceptual models into effective implementations, and methods and tools for developing and communicating conceptual models. The following workshops are included in this volume: CMLS – 4th International Workshop on Conceptual Modeling for Life Sciences; CMOMM4FAIR – Third Workshop on Conceptual Modeling, Ontologies and (Meta)data Management for Findable, Accessible, Interoperable, and Reusable (FAIR) Data; EmpER – 6th International Workshop on Empirical Methods in Conceptual Modeling; JUSMOD – Second International Workshop on Digital Justice, Digital Law and Conceptual Modeling; OntoCom – 9th International Workshop on Ontologies and Conceptual Modeling; QUAMES – 4th International Workshop on Quality and Measurement of Model-Driven Software Development; SmartFood – First Workshop on Controlled Vocabularies and Data Platforms for Smart Food Systems.
Advances in Conceptual Modeling: ER 2024 Workshops, AISA, CMLS, EmpER, QUAMES, JUSMOD, LLM4Modeling, Pittsburgh, PA, USA, October 28–31, 2024, Proceedings (Lecture Notes in Computer Science #14932)
by Motoshi Saeki Hans-Georg Fill Miguel Goulão Peter Fettke Silvana Castano Anna Bernasconi Cristine Griffo Julius Köpke Leah Wong João Araujo Clara Ayora Matteo Buffa Alberto García S. Jin-Taek Jung Beatriz Marín Stefano Montanelli Edelweis Rohrer José F. Reyes RománThis book constitutes the refereed proceedings of the workshops held at the 43rd International Conference on Conceptual Modeling, ER 2024, which took place in Pittsburgh, PA, USA, during October 28-31, 2024. The 22 full papers and 1 short paper included in this book were carefully reviewed and selected from 52 submissions. They stem from the following workshops: AISA’2024 - The First International Workshop on AI Services and Applications CMLS2024 - The 5th International Workshop on Conceptual Modeling for Life Sciences EmpER'24 -7th International Workshop on Empirical Methods in Conceptual Modeling QUAMES 2024 - 5th International Workshop on Quality and Measurement of Model-Driven Software Development JUSMOD24 - 3rd International Workshop on Digital JUStice, Digital Law and Conceptual MODeling LLM4Modeling - 2nd Workshop on Modeling in the Age of Large Language Models
Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris (Learning and Analytics in Intelligent Systems #14)
by Maria Virvou George A. TsihrintzisThis book introduces readers to some of the most significant advances in core computer science-based technologies. At the dawn of the 4th Industrial Revolution, the field of computer science-based technologies is growing continuously and rapidly, and is developing both in itself and in terms of its applications in many other disciplines. Written by leading experts and consisting of 18 chapters, the book is divided into seven parts: (1) Computer Science-based Technologies in Education, (2) Computer Science-based Technologies in Risk Assessment and Readiness, (3) Computer Science-based Technologies in IoT, Blockchains and Electronic Money, (4) Computer Science-based Technologies in Mobile Computing, (5) Computer Science-based Technologies in Scheduling and Transportation, (6) Computer Science-based Technologies in Medicine and Biology, and (7) Theoretical Advances in Computer Science with Significant Potential Applications in Technology. Featuring an extensive list of bibliographic references at the end of each chapter to help readers probe further into the application areas of interest to them, this book is intended for professors, researchers, scientists, engineers and students in computer science-related disciplines. It is also useful for those from other disciplines wanting to become well versed in some of the latest computer science-based technologies.
Advances in Corrosion Modelling (Engineering Materials)
by Reza JavaherdashtiThis book is devoted to explaining advanced modelling practices of corrosion management. The eleven expert-authored chapters cover various aspects of corrosion management, from the basics of corrosion and its underlying definitions and concepts to the use of specific methods such as fuzzy logic or TRIZ (Russian: Theory of Inventive Problem Solving) for modeling specific corrosion management practices or assets like pipelines. It features modeling of various corrosion processes and reactions via numerical analysis, machine learning, fuzzy calculus, and fuzzy logic. Each chapter is written by an expert in the field with significant experience, ensuring that the content is up-to-date and of the highest quality. This book is an essential resource for professionals in the industry who seek to enhance their understanding of corrosion and its management through state-of-the-art modeling methods.
Advances in Crowdfunding: Research and Practice
by Liang Zhao Rotem Shneor Bjørn-Tore FlåtenThis open access book presents a comprehensive and up-to-date collection of knowledge on the state of crowdfunding research and practice. It considers crowdfunding models and their different manifestations across a variety of geographies and sectors, and explores the perspectives of fundraisers, backers, platforms, and regulators. Gathering insights from a wide range of influential researchers in the field, the book balances concepts, theory, and case studies. Going beyond previous research on crowdfunding, the contributors also investigate issues of community, sustainability, education, and ethics. A vital resource for anyone researching crowdfunding, this book offers readers a deep understanding of the characteristics, business models, user-relations, and behavioural patterns of crowdfunding.
Advances in Crowdsourcing
by Ignacio Gil-Pechuán Fernando J. Garrigos-Simon Sofia Estelles-MiguelThis book attempts to link some of the recent advances in crowdsourcing with advances in innovation and management. It contributes to the literature in several ways. First, it provides a global definition, insights and examples of this managerial perspective resulting in a theoretical framework. Second, it explores the relationship between crowdsourcing and technological innovation, the development of social networks and new behaviors of Internet users. Third, it explores different crowdsourcing applications in various sectors such as medicine, tourism, information and communication technology (ICT), and marketing. Fourth, it observes the ways in which crowdsourcing can improve production, finance, management and overall managerial performance. Crowdsourcing, also known as "massive outsourcing" or "voluntary outsourcing," is the act of taking a job or a specific task usually performed by an employee of a company or contractors, and outsourcing it to a large group of people or a community (crowd or mass) via the Internet, through an open call. The term was coined by Jeff Howe in a 2006 issue of Wired magazine. It is being developed in different sciences (i. e. , medicine, engineering, ICT, management) and is used in the most successful companies of the modern era (i. e. , Apple, Facebook, Inditex, Starbucks). The developments in crowdsourcing has theoretical and practical implications, which will be explored in this book. Including contributions from international academics, scholars and professionals within the field, this book provides a global, multidimensional perspective on crowdsourcing.
Advances in Cryptology - ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I (Lecture Notes in Computer Science #9452)
by Tetsu Iwata Jung Hee CheonThe two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.
Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9814)
by Matthew Robshaw Jonathan KatzThe three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.
Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III (Lecture Notes in Computer Science #9816)
by Matthew Robshaw Jonathan KatzThe three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016. The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.
Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Lecture Notes in Computer Science #9666)
by Marc Fischlin Jean-Sébastien CoronThe two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowled≥ pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leaka≥ in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.
Advances in Cryptology -- CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Lecture Notes in Computer Science #7417)
by Reihaneh Safavi-Naini Ran CanettiThis book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.
Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (Lecture Notes in Computer Science #9215)
by Rosario Gennaro Matthew RobshawThe two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.
Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Lecture Notes in Computer Science #10031)
by Jung Hee Cheon and Tsuyoshi TakagiThe two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Lecture Notes in Computer Science #10032)
by Jung Hee Cheon and Tsuyoshi TakagiThe two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Lecture Notes in Computer Science #10624)
by Tsuyoshi Takagi and Thomas PeyrinThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II (Lecture Notes in Computer Science #10625)
by Tsuyoshi Takagi and Thomas PeyrinThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (Lecture Notes in Computer Science #10626)
by Tsuyoshi Takagi Thomas PeyrinThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I (Lecture Notes in Computer Science #11272)
by Thomas Peyrin Steven GalbraithThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11273)
by Thomas Peyrin Steven GalbraithThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III (Lecture Notes in Computer Science #11274)
by Thomas Peyrin Steven GalbraithThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11921)
by Shiho Moriai Steven D. GalbraithThe three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11922)
by Shiho Moriai Steven D. GalbraithThe three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.