Information and Communications Security: 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings: Lecture Notes in Computer Science, cartea 14252
Editat de Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chenen Limba Engleză Paperback – 20 oct 2023
The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1053.45 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 15% Preț: 429.74 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 567.60 lei
- 20% Preț: 575.48 lei
- 20% Preț: 571.63 lei
- 20% Preț: 747.79 lei
- 15% Preț: 568.74 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 574.05 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 747.79 lei
- 20% Preț: 809.19 lei
- 20% Preț: 649.49 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 656.34 lei
Preț vechi: 820.43 lei
-20% Nou
Puncte Express: 985
Preț estimativ în valută:
125.65€ • 130.61$ • 104.18£
125.65€ • 130.61$ • 104.18£
Carte tipărită la comandă
Livrare economică 05-19 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789819973552
ISBN-10: 9819973554
Pagini: 763
Ilustrații: XXV, 763 p. 209 illus., 169 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.09 kg
Ediția:1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
ISBN-10: 9819973554
Pagini: 763
Ilustrații: XXV, 763 p. 209 illus., 169 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 1.09 kg
Ediția:1st ed. 2023
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Singapore, Singapore
Cuprins
Symmetric-Key Cryptography.- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.- Improved Related-Key Rectangle Attack against the Full AES-192.- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher.- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation.- Public-Key Cryptography.- A Polynomial-time Attack on G2SIDH.- Improvements of Homomorphic Secure Evaluation of Inverse Square Root.- Oblivious Transfer from Rerandomizable PKE.- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model.- Applied Cryptography.- Secure Multi-Party Computation with Legally-Enforceable Fairness.- On-demand Allocation of Cryptographic Computing Resource with Load Prediction.- Private Message Franking with After Opening Privacy.- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction.- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.- Authentication and Authorization.- PiXi: Password Inspiration by Exploring Information.- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification.- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks.- Privacy and Anonymity.- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.- CryptoMask: Privacy-preserving Face Recognition.- Efficient Private Multiset ID Protocols.- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services.- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV.- Security and Privacy of AI.- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.- Multi-scale Features Destructive Universal Adversarial Perturbations.- Pixel-Wise Reconstruction of Private Data in Split Federated Learning.- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments.- Black-Box Fairness Testing with Shadow Models.- Graph Unlearning using Knowledge Distillation.- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings.- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference.- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation.- Blockchain and Cryptocurrencies.- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy.- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions.- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection.- BDTS: Blockchain-based Data Trading System.- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks.- System and Network security.- DRoT: A Decentralised Root of Trust for Trusted Networks.- Finding Missing Security Operation Bugs via Program Slicing and Differential Check.- TimeClave: Oblivious In-enclave Time series Processing System.- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.