- Table View
- List View
Advances in Conceptual Modeling: ER 2022 Workshops, CMLS, EmpER, and JUSMOD, Hyderabad, India, October 17–20, 2022, Proceedings (Lecture Notes in Computer Science #13650)
by Renata Guizzardi Bernd NeumayrThis book constitutes the refereed proceedings of three workshops symposia, held at the 41st International Conference on Conceptual Modeling, ER 2022, as a virtual event, in October 2022. The 11 papers deal with topics such as foundations; business information systems; advanced and cross-disciplinary applications, conceptual modeling, information systems and knowledge graphs; data/object management; engineering; and experience. The following workshops are included in this volume: Third International Workshop on Conceptual Modeling for Life Sciences (CMLS), 5th International Workshop on Empirical Methods in Conceptual Modeling (EmpER); and First International Workshop on Digital Justice, Digital Law and Conceptual Modeling (JUSMOD).
Advances in Conceptual Modeling: ER 2015 Workshops AHA, CMS, EMoV, MoBID, MORE-BI, MReBA, QMMQ, and SCME, Stockholm, Sweden, October 19-22, 2015, Proceedings (Lecture Notes in Computer Science #9382)
by Manfred A. Jeusfeld Kamalakar KarlapalemThis book constitutes the refereed proceedings of sevenworkshops and a symposium, held at the 34th International Conference onConceptual Modeling, ER 2015, in Stockholm, Sweden. The 26 revised full and 8 invited papers werecarefully reviewed and selected out of 52 submissions to the following events:Conceptual Modelling for Ambient Assistance and Healthy Ageing, AHA-2015;Conceptual Modelling of Services, CMS-2015; Event Modelling and Processing inBusiness Process Management, EMoV-2015; Modelling and Management of Big Data,MoBID-2015; Modelling and Reasoning for Business Intelligence, MORE-BI-2015;Conceptual Modelling in Requirements Engineering and Business Analysis,MREBA-2015; Quality of Modelling and Modelling of Quality, QMMQ-2015; and theSymposium on Conceptual Modelling Education, SCME-2015.
Advances in Conceptual Modeling: ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, Gifu, Japan, November 14–17, 2016, Proceedings (Lecture Notes in Computer Science #9975)
by Sebastian Link Juan C. TrujilloThis book constitutes the refereed proceedings of seven workshops and a symposium, held at the 35th International Conference on Conceptual Modeling, ER 2016, in Gifu, Japan. The 19 revised full and 3 keynote papers were carefully reviewed and selected out of 52 submissions to the following events: Conceptual Modeling for Ambient Assistance and Healthy Ageing, AHA 2016; Modeling and Management of Big Data, MoBiD 2016; Modeling and Reasoning for Business Intelligence, MORE-BI 2016; Conceptual Modeling in Requirements and Business Analysis, MREBA 2016; Quality of Models and Models of Quality, QMMQ 2016; and the Symposium on Conceptual Modeling Education, SCME 2016; and Models and Modeling on Security and Privacy, WM2SP 2016.
Advances in Conceptual Modeling: ER 2021 Workshops CoMoNoS, EmpER, CMLS St. John's, NL, Canada, October 18–21, 2021, Proceedings (Lecture Notes in Computer Science #13012)
by Iris Reinhartz-Berger Shazia SadiqThis book constitutes the refereed proceedings of three workshops symposia, held at the 40th International Conference on Conceptual Modeling, ER 2021, which were held virtually and in St. John’s, NL, Canada, in October 2021.The 11 papers promote and disseminate research on theories of concepts underlying conceptual modeling, methods and tools for developing and communicating conceptual models, techniques for transforming conceptual models into effective implementations, and the impact of conceptual modeling techniques on databases, business strategies and information systems. The following workshops are included in this volume: Second Workshop on Conceptual Modeling for NoSQL Data Stores (CoMoNoS); 4th International Workshop on Empirical Methods in Conceptual Modeling (EmpER); and Second International Workshop on Conceptual Modeling for Life Sciences (CMLS).
Advances in Conceptual Modeling: ER 2024 Workshops, AISA, CMLS, EmpER, QUAMES, JUSMOD, LLM4Modeling, Pittsburgh, PA, USA, October 28–31, 2024, Proceedings (Lecture Notes in Computer Science #14932)
by Motoshi Saeki Leah Wong João Araujo Clara Ayora Anna Bernasconi Matteo Buffa Silvana Castano Peter Fettke Hans-Georg Fill Alberto García S. Miguel Goulão Cristine Griffo Jin-Taek Jung Julius Köpke Beatriz Marín Stefano Montanelli Edelweis Rohrer José F. Reyes RománThis book constitutes the refereed proceedings of the workshops held at the 43rd International Conference on Conceptual Modeling, ER 2024, which took place in Pittsburgh, PA, USA, during October 28-31, 2024. The 22 full papers and 1 short paper included in this book were carefully reviewed and selected from 52 submissions. They stem from the following workshops: AISA’2024 - The First International Workshop on AI Services and Applications CMLS2024 - The 5th International Workshop on Conceptual Modeling for Life Sciences EmpER'24 -7th International Workshop on Empirical Methods in Conceptual Modeling QUAMES 2024 - 5th International Workshop on Quality and Measurement of Model-Driven Software Development JUSMOD24 - 3rd International Workshop on Digital JUStice, Digital Law and Conceptual MODeling LLM4Modeling - 2nd Workshop on Modeling in the Age of Large Language Models
Advances in Conceptual Modeling: ER 2023 Workshops, CMLS, CMOMM4FAIR, EmpER, JUSMOD, OntoCom, QUAMES, and SmartFood, Lisbon, Portugal, November 6–9, 2023, Proceedings (Lecture Notes in Computer Science #14319)
by Tiago Prince Sales João Araújo José Borbinha Giancarlo GuizzardiThis book constitutes the refereed proceedings of 7 workshops, held at the 42nd International Conference on Conceptual Modeling, ER 2023, held in Lisbon, Portugal, during November 6-9, 2023. The 28 full and 2 short papers were carefully reviewed and selected out of 53 submissions. Topics of interest span the entire spectrum of conceptual modeling, including research and practice in areas such as theories of concepts and ontologies, techniques for transforming conceptual models into effective implementations, and methods and tools for developing and communicating conceptual models. The following workshops are included in this volume: CMLS – 4th International Workshop on Conceptual Modeling for Life Sciences; CMOMM4FAIR – Third Workshop on Conceptual Modeling, Ontologies and (Meta)data Management for Findable, Accessible, Interoperable, and Reusable (FAIR) Data; EmpER – 6th International Workshop on Empirical Methods in Conceptual Modeling; JUSMOD – Second International Workshop on Digital Justice, Digital Law and Conceptual Modeling; OntoCom – 9th International Workshop on Ontologies and Conceptual Modeling; QUAMES – 4th International Workshop on Quality and Measurement of Model-Driven Software Development; SmartFood – First Workshop on Controlled Vocabularies and Data Platforms for Smart Food Systems.
Advances in Conceptual Modeling: ER 2017 Workshops AHA, MoBiD, MREBA, OntoCom, and QMMQ, Valencia, Spain, November 6–9, 2017, Proceedings (Lecture Notes in Computer Science #10651)
by Sergio de Cesare and Ulrich FrankThis book constitutes the refereed proceedings of five workshops and a symposium, held at the 36th International Conference on Conceptual Modeling, ER 2017, in Valencia, Spain in November 2017. The 21 revised full papers were carefully reviewed and selected out of 47 submissions to the following events: AHA 2017 - 3rd International Workshop on Modeling for Ambient Assistance and Healthy AgeingMoBiD 2017 - 6th International Workshop on Modeling and Management of Big DataMREBA 2017 - 4th International Workshop on Conceptual Modeling in Requirements and Business AnalysisOntoCom 2017 - 5th International Workshop on Ontologies and Conceptual ModelingQMMQ 2017 - 4th Workshop on Quality of Models and Models of Quality
Advances in Conceptual Modeling: ER 2018 Workshops Emp-ER, MoBiD, MREBA, QMMQ, SCME, Xi’an, China, October 22-25, 2018, Proceedings (Lecture Notes in Computer Science #11158)
by Carson Woo Jiaheng Lu Zhanhuai Li Tok Wang Ling Guoliang Li Mong Li LeeThis book constitutes the refereed proceedings of five workshops symposia, held at the 37th International Conference on Conceptual Modeling, ER 2018, in Xi’an, China, in October 2018. The 42 papers promote and disseminate research on theories of concepts underlying conceptual modeling, methods and tools for developing and communicating conceptual models, techniques for transforming conceptual models into effective implementations, and the impact of conceptual modeling techniques on databases, business strategies and information systems. The following workshops are included in this volume: Emp-ER: Empirical Methods in Conceptual Modeling, MoBiD: Modeling and Management of Big Data, MREBA: Conceptual Modeling in Requirements and Business Analysis, QMMQ: Quality of Models and Models of Quality, SCME: Conceptual Modeling Education.
Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris (Learning and Analytics in Intelligent Systems #14)
by George A. Tsihrintzis Maria VirvouThis book introduces readers to some of the most significant advances in core computer science-based technologies. At the dawn of the 4th Industrial Revolution, the field of computer science-based technologies is growing continuously and rapidly, and is developing both in itself and in terms of its applications in many other disciplines. Written by leading experts and consisting of 18 chapters, the book is divided into seven parts: (1) Computer Science-based Technologies in Education, (2) Computer Science-based Technologies in Risk Assessment and Readiness, (3) Computer Science-based Technologies in IoT, Blockchains and Electronic Money, (4) Computer Science-based Technologies in Mobile Computing, (5) Computer Science-based Technologies in Scheduling and Transportation, (6) Computer Science-based Technologies in Medicine and Biology, and (7) Theoretical Advances in Computer Science with Significant Potential Applications in Technology. Featuring an extensive list of bibliographic references at the end of each chapter to help readers probe further into the application areas of interest to them, this book is intended for professors, researchers, scientists, engineers and students in computer science-related disciplines. It is also useful for those from other disciplines wanting to become well versed in some of the latest computer science-based technologies.
Advances in Corrosion Modelling (Engineering Materials)
by Reza JavaherdashtiThis book is devoted to explaining advanced modelling practices of corrosion management. The eleven expert-authored chapters cover various aspects of corrosion management, from the basics of corrosion and its underlying definitions and concepts to the use of specific methods such as fuzzy logic or TRIZ (Russian: Theory of Inventive Problem Solving) for modeling specific corrosion management practices or assets like pipelines. It features modeling of various corrosion processes and reactions via numerical analysis, machine learning, fuzzy calculus, and fuzzy logic. Each chapter is written by an expert in the field with significant experience, ensuring that the content is up-to-date and of the highest quality. This book is an essential resource for professionals in the industry who seek to enhance their understanding of corrosion and its management through state-of-the-art modeling methods.
Advances in Crowdfunding: Research and Practice
by Liang Zhao Rotem Shneor Bjørn-Tore FlåtenThis open access book presents a comprehensive and up-to-date collection of knowledge on the state of crowdfunding research and practice. It considers crowdfunding models and their different manifestations across a variety of geographies and sectors, and explores the perspectives of fundraisers, backers, platforms, and regulators. Gathering insights from a wide range of influential researchers in the field, the book balances concepts, theory, and case studies. Going beyond previous research on crowdfunding, the contributors also investigate issues of community, sustainability, education, and ethics. A vital resource for anyone researching crowdfunding, this book offers readers a deep understanding of the characteristics, business models, user-relations, and behavioural patterns of crowdfunding.
Advances in Crowdsourcing
by Ignacio Gil-Pechuán Fernando J. Garrigos-Simon Sofia Estelles-MiguelThis book attempts to link some of the recent advances in crowdsourcing with advances in innovation and management. It contributes to the literature in several ways. First, it provides a global definition, insights and examples of this managerial perspective resulting in a theoretical framework. Second, it explores the relationship between crowdsourcing and technological innovation, the development of social networks and new behaviors of Internet users. Third, it explores different crowdsourcing applications in various sectors such as medicine, tourism, information and communication technology (ICT), and marketing. Fourth, it observes the ways in which crowdsourcing can improve production, finance, management and overall managerial performance. Crowdsourcing, also known as "massive outsourcing" or "voluntary outsourcing," is the act of taking a job or a specific task usually performed by an employee of a company or contractors, and outsourcing it to a large group of people or a community (crowd or mass) via the Internet, through an open call. The term was coined by Jeff Howe in a 2006 issue of Wired magazine. It is being developed in different sciences (i. e. , medicine, engineering, ICT, management) and is used in the most successful companies of the modern era (i. e. , Apple, Facebook, Inditex, Starbucks). The developments in crowdsourcing has theoretical and practical implications, which will be explored in this book. Including contributions from international academics, scholars and professionals within the field, this book provides a global, multidimensional perspective on crowdsourcing.
Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Lecture Notes in Computer Science #10032)
by Jung Hee Cheon and Tsuyoshi TakagiThe two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Lecture Notes in Computer Science #10031)
by Jung Hee Cheon and Tsuyoshi TakagiThe two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (Lecture Notes in Computer Science #10626)
by Tsuyoshi Takagi Thomas PeyrinThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Lecture Notes in Computer Science #10624)
by Tsuyoshi Takagi and Thomas PeyrinThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II (Lecture Notes in Computer Science #10625)
by Tsuyoshi Takagi and Thomas PeyrinThe three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11273)
by Steven Galbraith Thomas PeyrinThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part I (Lecture Notes in Computer Science #11272)
by Thomas Peyrin Steven GalbraithThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Advances in Cryptology – ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III (Lecture Notes in Computer Science #11274)
by Thomas Peyrin Steven GalbraithThe three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018.The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.
Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11922)
by Steven D. Galbraith Shiho MoriaiThe three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III (Lecture Notes in Computer Science #11923)
by Steven D. Galbraith Shiho MoriaiThe three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
Advances in Cryptology – ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11921)
by Steven D. Galbraith Shiho MoriaiThe three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12492)
by Shiho Moriai Huaxiong WangThe three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
Advances in Cryptology – ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III (Lecture Notes in Computer Science #12493)
by Shiho Moriai Huaxiong WangThe three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic.The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.