語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advances in information and computer...
~
International Workshop on Security (2024 :)
FindBook
Google Book
Amazon
博客來
Advances in information and computer security = 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Advances in information and computer security/ edited by Kazuhiko Minematsu, Mamoru Mimura.
其他題名:
19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024 : proceedings /
其他題名:
IWSEC 2024
其他作者:
Minematsu, Kazuhiko.
團體作者:
International Workshop on Security
出版者:
Singapore :Springer Nature Singapore : : 2024.,
面頁冊數:
xii, 308 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Authenticated Encryption. -- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes. -- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. -- Symmetric-key Cryptanalysis. -- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES. -- Weak Keys of the Full MISTY1 Recovered in Practical Time. -- Protocols. -- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. -- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. -- Analysis of Public-key Cryptosystems. -- Formal Verification of Emulated Floating-Point Arithmetic in Falcon. -- Experimental Analysis of Integer Factorization Methods Using Lattices. -- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. -- Vulnerability. -- Race condition vulnerabilities in WordPress plug-ins. -- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. -- Malware Countermeasure. -- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. -- Implementation for Malicious Software using ChatGPT-4. -- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. -- Network Security and Privacy. -- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. -- Information Leakage through Packet Lengths in RTC Traffic. -- A Study on Anonymization through Participation in iPWS Cup 2023.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-981-97-7737-2
ISBN:
9789819777372
Advances in information and computer security = 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024 : proceedings /
Advances in information and computer security
19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024 : proceedings /[electronic resource] :IWSEC 2024edited by Kazuhiko Minematsu, Mamoru Mimura. - Singapore :Springer Nature Singapore :2024. - xii, 308 p. :ill. (chiefly color), digital ;24 cm. - Lecture notes in computer science,149770302-9743 ;. - Lecture notes in computer science,14977..
Authenticated Encryption. -- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes. -- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. -- Symmetric-key Cryptanalysis. -- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES. -- Weak Keys of the Full MISTY1 Recovered in Practical Time. -- Protocols. -- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. -- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. -- Analysis of Public-key Cryptosystems. -- Formal Verification of Emulated Floating-Point Arithmetic in Falcon. -- Experimental Analysis of Integer Factorization Methods Using Lattices. -- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. -- Vulnerability. -- Race condition vulnerabilities in WordPress plug-ins. -- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. -- Malware Countermeasure. -- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. -- Implementation for Malicious Software using ChatGPT-4. -- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. -- Network Security and Privacy. -- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. -- Information Leakage through Packet Lengths in RTC Traffic. -- A Study on Anonymization through Participation in iPWS Cup 2023.
This book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024. The 14 full papers and 3 short papers were carefully reviewed and selected from 47 submissions. These papers were categorized into the following sections: authenticated encryption; symmetric-key cryptanalysis; protocols; analysis of public-key cryptosystems; vulnerability; malware countermeasure; network security and privacy.
ISBN: 9789819777372
Standard No.: 10.1007/978-981-97-7737-2doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Advances in information and computer security = 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024 : proceedings /
LDR
:03298nmm a2200373 a 4500
001
2374900
003
DE-He213
005
20240913130303.0
006
m d
007
cr nn 008maaau
008
241231s2024 si s 0 eng d
020
$a
9789819777372
$q
(electronic bk.)
020
$a
9789819777365
$q
(paper)
024
7
$a
10.1007/978-981-97-7737-2
$2
doi
035
$a
978-981-97-7737-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2024
111
2
$a
International Workshop on Security
$n
(19th :
$d
2024 :
$c
Kyoto, Japan)
$3
3724009
245
1 0
$a
Advances in information and computer security
$h
[electronic resource] :
$b
19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024 : proceedings /
$c
edited by Kazuhiko Minematsu, Mamoru Mimura.
246
3
$a
IWSEC 2024
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2024.
300
$a
xii, 308 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14977
505
0
$a
Authenticated Encryption. -- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes. -- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. -- Symmetric-key Cryptanalysis. -- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES. -- Weak Keys of the Full MISTY1 Recovered in Practical Time. -- Protocols. -- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. -- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. -- Analysis of Public-key Cryptosystems. -- Formal Verification of Emulated Floating-Point Arithmetic in Falcon. -- Experimental Analysis of Integer Factorization Methods Using Lattices. -- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. -- Vulnerability. -- Race condition vulnerabilities in WordPress plug-ins. -- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. -- Malware Countermeasure. -- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. -- Implementation for Malicious Software using ChatGPT-4. -- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. -- Network Security and Privacy. -- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. -- Information Leakage through Packet Lengths in RTC Traffic. -- A Study on Anonymization through Participation in iPWS Cup 2023.
520
$a
This book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024. The 14 full papers and 3 short papers were carefully reviewed and selected from 47 submissions. These papers were categorized into the following sections: authenticated encryption; symmetric-key cryptanalysis; protocols; analysis of public-key cryptosystems; vulnerability; malware countermeasure; network security and privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Minematsu, Kazuhiko.
$3
3724010
700
1
$a
Mimura, Mamoru.
$3
3724011
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14977.
$3
3724012
856
4 0
$u
https://doi.org/10.1007/978-981-97-7737-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9495349
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入