000929754 000__ 04135cam\a2200577Ia\4500 000929754 001__ 929754 000929754 005__ 20230306151348.0 000929754 006__ m\\\\\o\\d\\\\\\\\ 000929754 007__ cr\un\nnnunnun 000929754 008__ 200307s2020\\\\sz\\\\\\o\\\\\101\0\eng\d 000929754 019__ $$a1148866932 000929754 020__ $$a9783030417024$$q(electronic book) 000929754 020__ $$a3030417026$$q(electronic book) 000929754 020__ $$z9783030417017 000929754 0247_ $$a10.1007/978-3-030-41702-4$$2doi 000929754 035__ $$aSP(OCoLC)on1143624305 000929754 035__ $$aSP(OCoLC)1143624305$$z(OCoLC)1148866932 000929754 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dOCLCQ$$dSFB 000929754 049__ $$aISEA 000929754 050_4 $$aQA76.9.A25$$bW57 2019eb 000929754 08204 $$a005.8$$223 000929754 1112_ $$aWISTP (Conference)$$n(13th :$$d2019 :$$cParis, France) 000929754 24510 $$aInformation security theory and practice :$$b13th IFIP WG 11. 2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings /$$cMaryline Laurent, Thanassis Giannetsos (eds.). 000929754 2463_ $$aWISTP 2019 000929754 260__ $$aCham :$$bSpringer,$$c2020. 000929754 300__ $$a1 online resource (254 pages) 000929754 336__ $$atext$$btxt$$2rdacontent 000929754 337__ $$acomputer$$bc$$2rdamedia 000929754 338__ $$aonline resource$$bcr$$2rdacarrier 000929754 4901_ $$aLecture Notes in Computer Science ;$$vv. 12024 000929754 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000929754 500__ $$aInternational conference proceedings. 000929754 500__ $$aIncludes author index. 000929754 5050_ $$aInvited Paper -- How to Compartment Secrets -- Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations -- With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs -- From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper). 000929754 506__ $$aAccess limited to authorized users. 000929754 520__ $$aThis volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things. 000929754 588__ $$aDescription based on print version record. 000929754 650_0 $$aData protection$$vCongresses. 000929754 650_0 $$aComputer systems$$xAccess control$$vCongresses. 000929754 650_0 $$aComputer security$$vCongresses. 000929754 650_0 $$aUbiquitous computing$$vCongresses. 000929754 650_0 $$aMobile computing$$xSecurity measures$$vCongresses. 000929754 7001_ $$aLaurent-Maknavicius, Maryline. 000929754 7001_ $$aGiannetsos, Thanassis. 000929754 77608 $$iPrint version:$$aLaurent, Maryline.$$tInformation Security Theory and Practice : 13th IFIP WG 11. 2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings.$$dCham : Springer International Publishing AG, ©2020$$z9783030417017 000929754 830_0 $$aLecture notes in computer science ;$$v12024. 000929754 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000929754 852__ $$bebk 000929754 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-41702-4$$zOnline Access$$91397441.1 000929754 909CO $$ooai:library.usi.edu:929754$$pGLOBAL_SET 000929754 980__ $$aEBOOK 000929754 980__ $$aBIB 000929754 982__ $$aEbook 000929754 983__ $$aOnline 000929754 994__ $$a92$$bISE