Cantitate/Preț
Produs

Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 567

Editat de Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au
en Limba Engleză Paperback – 17 sep 2024
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:  
Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.
Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Citește tot Restrânge

Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Preț: 56995 lei

Preț vechi: 67053 lei
-15% Nou

Puncte Express: 855

Preț estimativ în valută:
10911 11342$ 9047£

Carte tipărită la comandă

Livrare economică 06-20 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031649479
ISBN-10: 3031649478
Ilustrații: XII, 483 p.
Dimensiuni: 155 x 235 mm
Ediția:2024
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Locul publicării:Cham, Switzerland

Cuprins

AI for Security.- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS.- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification.- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph.- DNN Architecture Attacks via Network and Power Side Channels.- Invisibility Spell Adversarial Patch Attack Against Object Detectors.- Meta Perturbation Generation Network for Text based CAPTCHA.- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval.- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas.- Authentication.- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density.- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home.- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller.- Blockchain and Distributed System Security.- Byzantine Protocols with Asymptotically Optimal Communication Complexity.- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving.- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography.- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption.- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS.- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage.- Efficient Zero Knowledge for Regular Language.- Enabling Fast Settlement in Atomic Cross-Chain Swaps.- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference.- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching.- Data Security.- An Authentication Algorithm for Sets of Spatial Data Objects.- An Efficient Private Information Retrieval Protocol Based on TFHE.- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries.- Password Cracking by Exploiting User Group Information.