Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13640)
Included in the following conference series:
Conference proceedings info: ISC 2022.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
Similar content being viewed by others
Keywords
- artificial intelligence
- authentication
- computer networks
- computer systems
- cryptography
- data communication systems
- data mining
- data security
- databases
- distributed computer systems
- distributed systems
- encryption
- engineering
- network protocols
- network security
- parallel processing systems
- public key cryptography
- signal processing
- software design
- software engineering
Table of contents (29 papers)
-
Cryptography
-
Post-quantum Cryptography
-
Blockchain
Other volumes
-
Information Security
Editors and Affiliations
Bibliographic Information
Book Title: Information Security
Book Subtitle: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings
Editors: Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-031-22390-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Softcover ISBN: 978-3-031-22389-1Published: 01 December 2022
eBook ISBN: 978-3-031-22390-7Published: 09 December 2022
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXIII, 510
Number of Illustrations: 34 b/w illustrations, 58 illustrations in colour
Topics: Systems and Data Security, Computer Systems Organization and Communication Networks, Cryptology, Mobile and Network Security