語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Foundations and practice of security...
~
FPS (Symposium) (2022 :)
FindBook
Google Book
Amazon
博客來
Foundations and practice of security = 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Foundations and practice of security/ edited by Guy-Vincent Jourdan ... [et al.].
其他題名:
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers /
其他題名:
FPS 2022
其他作者:
Jourdan, Guy-Vincent.
團體作者:
FPS (Symposium)
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xiii, 474 p. :ill. (some col.), digital ;24 cm.
內容註:
Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresse. -
電子資源:
https://doi.org/10.1007/978-3-031-30122-3
ISBN:
9783031301223
Foundations and practice of security = 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers /
Foundations and practice of security
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers /[electronic resource] :FPS 2022edited by Guy-Vincent Jourdan ... [et al.]. - Cham :Springer Nature Switzerland :2023. - xiii, 474 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,138771611-3349 ;. - Lecture notes in computer science ;13877..
Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
ISBN: 9783031301223
Standard No.: 10.1007/978-3-031-30122-3doiSubjects--Topical Terms:
3630894
Computer security
--Congresse.
LC Class. No.: QA76.9.A25 / F68 2022
Dewey Class. No.: 005.8
Foundations and practice of security = 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers /
LDR
:04119nmm a2200373 a 4500
001
2317090
003
DE-He213
005
20230331080511.0
006
m d
007
cr nn 008maaau
008
230902s2023 sz s 0 eng d
020
$a
9783031301223
$q
(electronic bk.)
020
$a
9783031301216
$q
(paper)
024
7
$a
10.1007/978-3-031-30122-3
$2
doi
035
$a
978-3-031-30122-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
F68 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
F796 2022
111
2
$a
FPS (Symposium)
$n
(15th :
$d
2022 :
$c
Ottawa, Ont.)
$3
3630891
245
1 0
$a
Foundations and practice of security
$h
[electronic resource] :
$b
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022 : revised selected papers /
$c
edited by Guy-Vincent Jourdan ... [et al.].
246
3
$a
FPS 2022
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xiii, 474 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
13877
505
0
$a
Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
520
$a
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
650
0
$a
Computer security
$v
Congresse.
$3
3630894
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
1 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Jourdan, Guy-Vincent.
$3
3630892
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13877.
$3
3630893
856
4 0
$u
https://doi.org/10.1007/978-3-031-30122-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9453340
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 F68 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入