Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security = 26th Internat...
~
ISC (Conference : Information security) (2023 :)
Linked to FindBook
Google Book
Amazon
博客來
Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information security/ edited by Elias Athanasopoulos, Bart Mennink.
Reminder of title:
26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
remainder title:
ISC 2023
other author:
Athanasopoulos, Elias.
corporate name:
ISC (Conference : Information security)
Published:
Cham :Springer Nature Switzerland : : 2023.,
Description:
xiv, 598 p. :illustrations (some col.), digital ;24 cm.
[NT 15003449]:
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures -
Online resource:
https://doi.org/10.1007/978-3-031-49187-0
ISBN:
9783031491870
Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
Information security
26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /[electronic resource] :ISC 2023edited by Elias Athanasopoulos, Bart Mennink. - Cham :Springer Nature Switzerland :2023. - xiv, 598 p. :illustrations (some col.), digital ;24 cm. - Lecture notes in computer science,144110302-9743 ;. - Lecture notes in computer science ;14411..
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023. The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
ISBN: 9783031491870
Standard No.: 10.1007/978-3-031-49187-0doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
LDR
:04174nmm a2200373 a 4500
001
2336034
003
DE-He213
005
20231130120812.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031491870
$q
(electronic bk.)
020
$a
9783031491863
$q
(paper)
024
7
$a
10.1007/978-3-031-49187-0
$2
doi
035
$a
978-3-031-49187-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.I77 2023
111
2
$a
ISC (Conference : Information security)
$n
(26th :
$d
2023 :
$c
Groningen, Netherlands)
$3
3668858
245
1 0
$a
Information security
$h
[electronic resource] :
$b
26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
$c
edited by Elias Athanasopoulos, Bart Mennink.
246
3
$a
ISC 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xiv, 598 p. :
$b
illustrations (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14411
505
0
$a
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
520
$a
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023. The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Athanasopoulos, Elias.
$3
2186519
700
1
$a
Mennink, Bart.
$3
3668859
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14411.
$3
3668860
856
4 0
$u
https://doi.org/10.1007/978-3-031-49187-0
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9462239
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login