Cantitate/Preț
Produs

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II: Lecture Notes in Computer Science, cartea 14527

Editat de Chunpeng Ge, Moti Yung
en Limba Engleză Paperback – 25 feb 2024
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023.

The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: 
Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; 
Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 44417 lei  6-8 săpt.
  Springer Nature Singapore – 25 feb 2024 44417 lei  6-8 săpt.
  Springer Nature Singapore – 26 feb 2024 47479 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 44417 lei

Preț vechi: 55522 lei
-20% Nou

Puncte Express: 666

Preț estimativ în valută:
84100 8962$ 7076£

Carte tipărită la comandă

Livrare economică 10-24 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9789819709441
ISBN-10: 981970944X
Ilustrații: XVII, 419 p. 114 illus., 90 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.61 kg
Ediția:2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Singapore, Singapore

Cuprins

​System Security: Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models.- An Android Malware Detection Method Using Better API Contextual Information.- TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method.- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation.- Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing.- TIA: Token Importance Transferable Attack on Vision Transformers.- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber.- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture.- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr.- Automatic Search of Linear Structure: Applications to Keccak and Ascon.- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128.- Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound.- Full Round Distinguishing and Key-Recovery Attacks on SAND-2.- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis.- Non-malleable Codes from Leakage Resilient Cryptographic Primitives.- Short paper: DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy.- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles.- Quantum Augmented Lattice Attack on NTRU with Side Information.- Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm.- FaBFT: Flexible Asynchronous BFT Protocol Using DAG.- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search.- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments.- Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things.- TRGE: A Backdoor Detection after Quantizatio.- Improved Homomorphic Evaluation for Hash Function based on TFHE.- Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM.- Partial Key Exposure Attack on Common Prime RSA.- An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth.