Information security = 26th Internat...
ISC (Conference : Information security) (2023 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security/ edited by Elias Athanasopoulos, Bart Mennink.
    Reminder of title: 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
    remainder title: ISC 2023
    other author: Athanasopoulos, Elias.
    corporate name: ISC (Conference : Information security)
    Published: Cham :Springer Nature Switzerland : : 2023.,
    Description: xiv, 598 p. :illustrations (some col.), digital ;24 cm.
    [NT 15003449]: Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
    Contained By: Springer Nature eBook
    Subject: Computer networks - Security measures -
    Online resource: https://doi.org/10.1007/978-3-031-49187-0
    ISBN: 9783031491870
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login