Cantitate/Preț
Produs

Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings: Lecture Notes in Computer Science, cartea 13640

Editat de Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan
en Limba Engleză Paperback – dec 2022
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.

The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 51486 lei

Preț vechi: 64357 lei
-20% Nou

Puncte Express: 772

Preț estimativ în valută:
9856 10737$ 8268£

Carte tipărită la comandă

Livrare economică 18 decembrie 24 - 01 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031223891
ISBN-10: 3031223896
Pagini: 510
Ilustrații: XXIII, 510 p. 92 illus., 58 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.74 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched Fully Homomorphic Encryption from TFHE.- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.- Dissecting Applications Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code Property Graph.- Why we need a theory of maliciousness: Hardware Performance Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.- Communication-Efficient and Secure Federated Learning Based on Adaptive
One-bit Compressed Sensing.